Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,016,459 papers from all fields of science
Search
Sign In
Create Free Account
RC4
Known as:
RC4 (cipher)
, Arcfour
, RC4 cipher
Expand
In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher. While remarkable for its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
Anyplace Control
Authenticated encryption
Block cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Evaluation of Community Health Education Workshops among Chinese Older Adults in Chicago: A Community-Based Participatory Research Approach
XinQi Dong
,
Yawen Li
,
Ruijia Chen
,
E. Chang
,
M. Simon
2013
Corpus ID: 74384940
Background: Health education is one of the proven ways to improve knowledge and change health attitudes and behaviors. This study…
Expand
Highly Cited
2007
Highly Cited
2007
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Håkan Englund
,
T. Johansson
,
Meltem Sönmez Turan
International Conference on Cryptology in India
2007
Corpus ID: 18097959
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several…
Expand
2007
2007
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings
S. Boztaş
,
Hsiao-feng Lu
International Symposium on Applied Algebra…
2007
Corpus ID: 29505527
2005
2005
Towards a security benchmark for database management systems
M. Vieira
,
H. Madeira
Dependable Systems and Networks
2005
Corpus ID: 15341854
One of the main problems faced by organizations is the protection of their data against unauthorized access or corruption due to…
Expand
2005
2005
Diseño de un instrumento de medida para el análisis comparativo de los recursos culturales tangibles
J. Rodríguez
,
I. Muradas
2005
Corpus ID: 142939753
Resumen es: La formulacion de estrategias de marketing de turismo cultural necesita una correcta evaluacion de los recursos…
Expand
Highly Cited
2005
Highly Cited
2005
Towards a General RC4-Like Keystream Generator
G. Gong
,
K. Gupta
,
Martin Hell
,
Yassir Nawaz
CISC
2005
Corpus ID: 9184065
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64…
Expand
2004
2004
On the performance of open-loop transmit diversity techniques for IS-2000 systems: a comparative study
R. Soni
,
R. Buehrer
IEEE Transactions on Wireless Communications
2004
Corpus ID: 13078806
Third-generation code-division multiple access (CDMA) cellular systems incorporate a downlink transmission technique called…
Expand
2002
2002
Secure wireless gateway
Austin Godber
,
P. Dasgupta
WISE
2002
Corpus ID: 590614
Wireless LANs (WLAN), using the IEEE 802.11b standard, have been shown to be inherently insecure. Given the widespread use of…
Expand
Highly Cited
2000
Highly Cited
2000
A Related-Key Cryptanalysis of RC4
Alexander Grosul
,
D. Wallach
2000
Corpus ID: 14507944
In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related…
Expand
1988
1988
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Gérard Cohen
,
Marc Giusti
,
T. Mora
Lecture Notes in Computer Science
1988
Corpus ID: 1816878
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE