Login / Signup
Weaknesses in the Key Scheduling Algorithm of RC4.
Scott R. Fluhrer
Itsik Mantin
Adi Shamir
Published in:
Selected Areas in Cryptography (2001)
Keyphrases
</>
scheduling algorithm
response time
scheduling strategy
scheduling policies
computational grids
load balance
resource requirements
access latency
optimal scheduling
mobile devices
np hard
grid environment
scheduling and resource allocation