2021
DOI: 10.1007/978-3-030-64758-2_2
|View full text |Cite
|
Sign up to set email alerts
|

RC4D: A New Development of RC4 Encryption Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…These include social influence, technology anxiety, trust, perceived risk, perceived fitness, and resistance to change. Furthermore, [57] mention self-efficacy, subjective norm, pleasure, anxiety, facilitating conditions, social influence, innovation, and satisfaction as key determinants of t new technology usage.…”
Section: Discussionmentioning
confidence: 99%
“…These include social influence, technology anxiety, trust, perceived risk, perceived fitness, and resistance to change. Furthermore, [57] mention self-efficacy, subjective norm, pleasure, anxiety, facilitating conditions, social influence, innovation, and satisfaction as key determinants of t new technology usage.…”
Section: Discussionmentioning
confidence: 99%
“…Cryptographic Scheme [49,50]. From the trend of the encryption time from Table 1, it could be concluded that encryption times for NCS and EHS are not dependent on data size but the size of the key while the encryption times for Salsa20, Chacha20, and ERSA are influenced by data size.…”
Section: Plos Onementioning
confidence: 97%
“…The advantages of the RC4 algorithm are that the algorithm is effective, simple, and well-suited for program implementation, which are distinguished by their implementation speed, do not require a great amount of storage space, and has less complexity [1], and it is frequently used in protocols and standards such as Skype, WPA, WEP, and SSL/TLS [14].…”
Section: The Advantages and Application Of Rc4mentioning
confidence: 99%
“…Rivest cipher 4 (RC4) is a significant cipher of the stream that could be found in a wide range of protocols of the internet, including Skype, secure socket layer, transport layer security (SSL/TLS), wireless protected access (WPA), and wired equivalent privacy (WEP) [1], [2]. The speed and clarity of the RC4 algorithm's significant operators have been over such a substantial field of applications; the efficient implementation of both hardware and software has been extremely easy to develop [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation