Results 1 - 10
of
135
Proof of empirical RC4 biases and new key correlations
- in Selected Areas in Cryptography, ser. Lecture Notes in Computer Science
, 2011
"... Abstract. In SAC 2010, Sepehrdad, Vaudenay and Vuagnoux have re-ported some empirical biases between the secret key, the internal state variables and the keystream bytes of RC4, by searching over a space of all linear correlations between the quantities involved. In this paper, for the first time, w ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract. In SAC 2010, Sepehrdad, Vaudenay and Vuagnoux have re-ported some empirical biases between the secret key, the internal state variables and the keystream bytes of RC4, by searching over a space of all linear correlations between the quantities involved. In this paper, for the first time
On Non-Randomness of the Permutation after RC4 Key
"... Abstract. Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) bytes and denote it by SN after the KSA. Under reasonable assumptions we present a simple proof that each permutation byte ..."
Abstract
- Add to MetaCart
on the secret key. We also present a detailed empirical study over Mantin’s work when the theoretical formulae vary significantly from experimental results due to repetition of short keys in RC4. Further, it is explained how these results can be used to identify new distinguishers for RC4 keystream.
Discovery and Exploitation of New Biases in RC4
"... Abstract. In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
Abstract. In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known
Proving TLS-attack related open biases of RC4
"... Abstract. After a series of works on RC4 cryptanalysis in last few years (published in flagship cryptology conferences and journals), the most significant (and also very recent) attack on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan, Bernstein, Paterson, ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
after the Key Scheduling Algorithm. In this connection, we prove the anomaly in S0[128] = 127, a problem open for more than a decade. Other than proving the new biases, we also complete the proof for the extended keylength dependent biases in RC4, a problem attempted and partially solved by Isobe
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA?
"... Abstract. The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 key. In this paper, we provide a disciplined study of RC4 biases result-ing specifically i ..."
Abstract
- Add to MetaCart
the correlation of initial keystream bytes in WPA to the first three bytes of the RC4 key. As these bytes are known from the IV, one can obtain new as well as significantly improved biases in WPA than the absolute biases exploited earlier by AlFardan et al. or Isobe et al. We notice that the correlations
Longer-term effects of Head Start
- American Economic Review
, 2002
"... Abstract Public early intervention programs like Head Start are often justified as investments in children. Yet nothing is known about the long-term effects of Head Start. This paper draws on unique data from the Panel Study of Income Dynamics to provide new evidence on the effects of Head Start on ..."
Abstract
-
Cited by 131 (5 self)
- Add to MetaCart
-term panel, we know family income when the respondent was a child. We have calculated average per capita family income (in 1999 prices) at the time the respondent was age 3, 4, 5 and 6, and, as shown in III. Empirical methods The aim of this study is to ask whether participation in Head Start results
Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Proving TLS-attack related open biases of RC4
"... Abstract After a series of results on RC4 cryptanalysis in flagship cryptology conferences and journals, one of the most significant recent attacks on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan et al. (USENIX 2013). Through extensive computations, they ..."
Abstract
- Add to MetaCart
. In this connection, we also prove the anomaly in the 128th element of the permutation after the Key Scheduling Algorithm. Finally, the proof for the extended key-length dependent biases in RC4 keystream sequence, a problem attempted and partially solved by Isobe et al. in FSE 2013, has also been completed
Empirical Bias Corrections for Fitting Multilevel Models under Informative Sampling
"... Survey data are generally obtained via a complex sampling design involving clustering, stratification and unequal sample inclusion probabilities. When the inclusion probabilities are correlated with the model outcomes after conditioning on the auxiliary variables, the sampling process is informative ..."
Abstract
- Add to MetaCart
of the first and second levels of the model hierarchy. The performance of the new method and alternative bias correction approaches proposed in the literature are assessed via an extensive simulation study and an application to a real data set. Key Words: bootstrap, complex survey data, probability weighting.
Training and Age-Biased Technical Change
- Annals of Economics and Statistics
, 2010
"... Abstract Using a matched employer-employee dataset on the French manufacturing sector in the 1990s, we investigate how training incidence responds to technical and organizational changes across age groups. Using a difference-in-difference approach across age groups and types of firms, we find that ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
, and results appear in Section 3, followed by concluding comments in Section 4. 5/37 Empirical approach Our key empirical question is whether older workers suffer from a lower access to training in firms using advanced technologies and/or implementing innovative organizational practices. Formally, we would
A meta-analytic review of obesity prevention programs for children and adolescents: The skinny on interventions that work.
- Psychological Bulletin,
, 2006
"... This meta-analytic review summarizes obesity prevention programs and their effects and investigates participant, intervention, delivery, and design features associated with larger effects. A literature search identified 64 prevention programs seeking to produce weight gain prevention effects, of wh ..."
Abstract
-
Cited by 76 (4 self)
- Add to MetaCart
unique feature of meta-analyses is that they permit empirical examination of factors associated with variation in effect sizes. Elucidating factors that moderate prevention program effects is informative because it highlights aspects of the participants, intervention, program delivery, and research
Results 1 - 10
of
135