BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256
暂无分享,去创建一个
[1] Michael Mascagni,et al. SPRNG: A Scalable Library for Pseudorandom Number Generation , 1999, PP.
[2] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[3] Werner Schindler,et al. Evaluation Criteria for True (Physical) Random Number Generators Used in Cryptographic Applications , 2002, CHES.
[4] David J. Sheskin,et al. Handbook of Parametric and Nonparametric Statistical Procedures , 1997 .
[5] Gregory V. Bard,et al. Algebraic Cryptanalysis , 2009 .
[6] Emil Simion,et al. The Relevance of Statistical Tests in Cryptography , 2015, IEEE Security & Privacy.
[7] Vashek Matyas,et al. Constructing empirical tests of randomness , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[8] Thomas Johansson,et al. A Framework for Chosen IV Statistical Analysis of Stream Ciphers , 2007, INDOCRYPT.
[9] Alex Biryukov,et al. Automatic Search for Differential Trails in ARX Ciphers , 2014, CT-RSA.
[10] Pedro Isasi,et al. Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA , 2004 .
[11] Paul Stankovski,et al. Greedy Distinguishers and Nonrandomness Detectors , 2010, INDOCRYPT.
[12] Pierre L'Ecuyer,et al. TestU01: A C library for empirical testing of random number generators , 2006, TOMS.
[13] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[14] Sylvain Chevillard,et al. The functions erf and erfc computed with arbitrary precision and explicit error bounds , 2009, Inf. Comput..
[15] Eric Filiol,et al. A New Statistical Testing for Symmetric Ciphers and Hash Functions , 2002, ICICS.
[16] Vashek Matyas,et al. The Million-Key Question - Investigating the Origins of RSA Public Keys , 2016, USENIX Security Symposium.
[17] Petr Svenda,et al. The Efficient Randomness Testing using Boolean Functions , 2017, SECRYPT.
[18] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[19] Howard M. Heys,et al. A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS , 2002, Cryptologia.