• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 137
Next 10 →

Proving TLS-attack related open biases of RC4

by Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
"... Abstract. After a series of works on RC4 cryptanalysis in last few years (published in flagship cryptology conferences and journals), the most significant (and also very recent) attack on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan, Bernstein, Paterson, ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
after the Key Scheduling Algorithm. In this connection, we prove the anomaly in S0[128] = 127, a problem open for more than a decade. Other than proving the new biases, we also complete the proof for the extended keylength dependent biases in RC4, a problem attempted and partially solved by Isobe

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Proving TLS-attack related open biases of RC4

by Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra
"... Abstract After a series of results on RC4 cryptanalysis in flagship cryptology conferences and journals, one of the most significant recent attacks on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan et al. (USENIX 2013). Through extensive computations, they ..."
Abstract - Add to MetaCart
, they identified some new significant short-term single-byte biases in RC4 keystream sequence, and utilized those, along-with existing biases, towards the TLS attack. The current article proves these new and unproved biases in RC4, and in the process discovers intricate non-randomness within the cipher

Some results on RC4 in WPA

by Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
"... Abstract. Motivated by the work of AlFardan et al 2013, in this paper we present several results related to RC4 non-randomness in WPA. We first prove the interesting zig-zag distribution of the first byte and the similar nature for the biases in the initial keystream bytes to zero. As we note, this ..."
Abstract - Add to MetaCart
Abstract. Motivated by the work of AlFardan et al 2013, in this paper we present several results related to RC4 non-randomness in WPA. We first prove the interesting zig-zag distribution of the first byte and the similar nature for the biases in the initial keystream bytes to zero. As we note

Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA?

by Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
"... Abstract. The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 key. In this paper, we provide a disciplined study of RC4 biases result-ing specifically i ..."
Abstract - Add to MetaCart
Abstract. The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 key. In this paper, we provide a disciplined study of RC4 biases result-ing specifically

(Non-)Random Sequences from (Non-)Random Permutations- Analysis of RC4 stream cipher

by Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
"... RC4 has been the most popular stream cipher in the history of symmetric key cryptography till date. Its internal state contains a pseudo-random permutation over all n-bit words (typically n = 8) and it attempts to generate a pseudo-random sequence of words by extracting elements of this permutatio ..."
Abstract - Cited by 13 (6 self) - Add to MetaCart
the observation by Mironov [CRYPTO 2002]. Further, the existence of positive biases towards zero for all the initial bytes 3 to 255 is proved and exploited towards a generalized broadcast attack on RC4 stream cipher.

Journeys in the country of the blind: entanglement theory and the effects of blinding on trials of homeopathy and homeopathic provings,” Evidence-Based Complementary and Alternative

by Lionel R Milgrom - Medicine , 2007
"... The idea of quantum entanglement is borrowed from physics and developed into an algebraic argument to explain how double-blinding randomized controlled trials could lead to failure to provide unequivocal evidence for the efficacy of homeopathy, and inability to distinguish proving and placebo group ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The idea of quantum entanglement is borrowed from physics and developed into an algebraic argument to explain how double-blinding randomized controlled trials could lead to failure to provide unequivocal evidence for the efficacy of homeopathy, and inability to distinguish proving and placebo

Consistency Relations for the Conformal Mechanism

by Paolo Creminellia, Austin Joyceb, Justin Khouryb
"... We systematically derive the consistency relations associated to the non-linearly realized symmetries of theories with spontaneously broken conformal symmetry but with a linearly-realized de Sitter subalgebra. These identities relate (N+1)-point correlation functions with a soft external Goldstone t ..."
Abstract - Add to MetaCart
We systematically derive the consistency relations associated to the non-linearly realized symmetries of theories with spontaneously broken conformal symmetry but with a linearly-realized de Sitter subalgebra. These identities relate (N+1)-point correlation functions with a soft external Goldstone

One Proposition about Dynamic Portfolio Selection in an Open Economy and International Diversification

by Takaaki Aoki
"... This paper describes one proposition about dynamic Markowitz portfolio selection in a two-country open economy. Here it is proved that, assuming that two countries in an open economy share the same risk absolute aversion coefficient and the same information set with some conditions, the portfolio ea ..."
Abstract - Add to MetaCart
This paper describes one proposition about dynamic Markowitz portfolio selection in a two-country open economy. Here it is proved that, assuming that two countries in an open economy share the same risk absolute aversion coefficient and the same information set with some conditions, the portfolio

Object/relational query optimization with chase

by Lucian Popa
"... and backchase ..."
Abstract - Add to MetaCart
and backchase

The Coin Problem, and Pseudorandomness for Branching Programs

by Joshua Brody, Elad Verbin
"... is given, which lands on head with probability either 1/2+β or 1/2 − β. We are given the outcome of n independent tosses of this coin, and the goal is to guess which way the coin is biased, and to answer correctly with probability ≥ 2/3. When our computational model is unrestricted, the majority fun ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
function is optimal, and succeeds when β ≥ c / √ n foralargeenough constant c. The coin problem is open and interesting in models that cannot compute the majority function. In this paper we study the coin problem in the model of read-once width-w branching programs. We prove that in order to succeed
Next 10 →
Results 1 - 10 of 137
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University