On the Security of RC4 in TLS

@inproceedings{AlFardan2013OnTS,
  title={On the Security of RC4 in TLS},
  author={Nadhem J. AlFardan and Daniel J. Bernstein and Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt},
  booktitle={USENIX Security Symposium},
  year={2013}
}
Highly Influential
This paper has highly influenced 30 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 136 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 97 extracted citations

No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large

2016 11th International Conference on Availability, Reliability and Security (ARES) • 2016
View 6 Excerpts
Highly Influenced

Analysis of Burn-in period for RC4 State Transition

IACR Cryptology ePrint Archive • 2017
View 6 Excerpts
Highly Influenced

Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate

2017 IEEE Symposium on Security and Privacy (SP) • 2017
View 5 Excerpts
Highly Influenced

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN

ACM Conference on Computer and Communications Security • 2016
View 5 Excerpts
Highly Influenced

On the security of CBC Mode in SSL3.0 and TLS1.0

J. Internet Serv. Inf. Secur. • 2016
View 6 Excerpts
Highly Influenced

Previously overlooked bias signatures for RC4

2016 4th International Symposium on Digital Forensic and Security (ISDFS) • 2016
View 7 Excerpts
Highly Influenced

Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs

Cryptography and Communications • 2016
View 9 Excerpts
Highly Influenced

Security evaluation of RC4 using big data analytics

2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS) • 2016
View 8 Excerpts
Highly Influenced

136 Citations

02040'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 136 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

@BULLET Future work --many other security protocols make use of RC4: @BULLET WPA, Bit-Torrent, Microsoft Point-to-Point Encryption

@BULLET Future work --many other security protocols make use of RC4: @BULLET WPA, Bit-Torrent, Microsoft Point-to-Point Encryption

@BULLET Similar analysis and attacks might be applicable

@BULLET Similar analysis and attacks might be applicable

Probability* Byte*value*

Probability* Byte*value*

Similar Papers

Loading similar papers…