G. Paterson, Bertram Poettering, and Jacob C. N. Schuldt. On the Security of RC4 in TLS. In USENIX Security Symposium 2013, 2013. [DMPS11] Apurba Das, Subhamoy Maitra, Goutam Paul, and Santanu Sarkar. Some Combinatorial Results towards State Recovery Attack on RC4. In Sushil Jajodia and Chandan Mazumdar, editors, Information Systems Security - ICISS 2011, volume 7093 of Lecture Notes in Computer Science, pages 204–214. Springer Berlin Heidelberg, 2011. [FMS01] Scott Fluhrer, Itsik Mantin, and Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography - SAC 2001, volume 2259 of Lecture Notes in Computer Science, pages 1–24. Springer Berlin Heidelberg, 2001. [GMM+14] Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, and Santanu Sarkar. Dependence in IV-related bytes of RC4 key enhances vulunerabilities in WPA. In Fast Software Encryption - FSE 2014. To appear, 2014. [GMPS11] Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, and Santanu Sarkar. Proof of Empirical RC4 Biases and New Key Correlations. In Ali Miri and Serge Vaudenay, editors, Selected Areas in Cryptography - SAC 2011, volume 7118 of Lecture Notes in Computer Science, pages 151–168. Springer Berlin Heidelberg, 2011. [IOWM14] Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii. Full Plaintext Recovery Attack on Broadcast RC4. In Shiho Moriai, editor, Fast Software Encryption - FSE 2013, volume 8424 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2014. [Jen96] R. J. Jenkins. ISAAC and RC4. http://burtleburtle.net/bob/rand/isaac.html, 1996. [Kle08] Andreas Klein. Attacks on the RC4 stream cipher. Designs, Codes and Cryptography, 48(3):269–286, April 2008. ҏ౻ ཽഅ (JAIST) WPA ʹ͓͚Δ RC4 ͷ෦ঢ়ଶʹؔ͢Δ৽͍͠ઢܗ૬ؔ (SCIS 2015) 2015. 1. 21 25 / 28