Masakatu Morii. Full Plaintext Recovery Attack on Broadcast RC4. In Shiho Moriai, editor, Fast Software Encryption - FSE 2013, volume 8424 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. [MP08] Subhamoy Maitra and Goutam Paul. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In Kaisa Nyberg, editor, Fast Software Encryption - FSE 2008, volume 5086 of Lecture Notes in Computer Science, pages 253–269. Springer Berlin Heidelberg, 2008. [Pop15] Andrey Popov. Prohibiting RC4 cipher suites. Internet Engineering Task Force - IETF, Request for Comments, 7465, February 2015. [Sar14] Santanu Sarkar. Proving Empirically key-correlations in RC4. Information Processing Letters, 114 (5):234–238, 2014. [SVV11] Pouyan Sepehrdad, Serge Vaudenay, and Martin Vuagnoux. Discovery and Exploitation of New Biases in RC4. In Alex Biryukov, Guang Gong, and Douglas R. Stinson, editors, Selected Areas in Cryptography - SAC 2010, volume 6544 of Lecture Notes in Computer Science, pages 74–91. Springer Berlin Heidelberg, 2011. [VP15] Mathy Vanhoef and Frank Piessens. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. In USENIX Security Symposium 2015, pages 97–112, 2015. [VV07] Serge Vaudenay and Martin Vuagnoux. Passive – only Key Recovery Attack on RC4. In Carlisle Adams, Ali Miri, and Michael Wiener, editors, Selected Areas in Cryptography - SAC 2007, volume 4876 of Lecture Notes in Computer Science, pages 344–359. Springer Berlin Heidelberg, 2007. ҏ౻ ཽഅ (େࡕେֶ) ετϦʔϜ҉߸ RC4 ʹ͓͚Δ෮ੑͷ͋Δ৽͍͠ݤ૬ؔ (SCIS 2018) 2018. 1. 24 32 / 32