![]() ![]() : Evaluation of the RC4 Algorithm as a Solution for Converged Networks, J. : Weakness in the Key Scheduling Algorithm of RC4., Proceedings Workshop in Selected Areas of Cryptography, 2001. : A Practical Attack on Broadcast RC4, Proceedings Fast Software Encryption, 2001. : Statistical Analysis of the Alleged RC4 Key Stream Generator, Proceedings Fast Software Encryption, 2000. : Cryptanalysis of RC4-Like Ciphers, Proceedings Workshop in Selected Areas of Cryptography SAC ’98, 1998. ![]() KNUDSEN, L.et al : Analysis Method for Alleged RC4, Proceedings ASIACRYPT ’98, 1998. : Cryptography and Network Security, Prentice Hall, 2005. Computers at Risk: Safe computing in the information age, USA National Research Council,1991. : Deploying VoIP: Weigh the pros and cons of convergence 5100-10878 11-6187594.htm, May 31, 2007, last visit. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |