References

  • Bhowmik, D., A. Datta, and S. Sinha. 2015. A bit-level block cipher diffusion analysis test - BLDAT. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, eds. S. Satapathy, B. Biswal, S. Udgata, J. Mandal, vol 327. Cham: Springer. doi:10.1007/978-3-319-11933-5_75.
  • Dawson, E., H. Gustafson, and A. N. Pettitt. 1992. Strict Key Avalanche Criterion, Australasian Journal of Combinatorics 6:147–53.
  • Li, L. 2012. Testing several types of random number generator. A Thesis submitted to the Department of Computer Science, Florida State University, USA.
  • Marsaglia, G., and A. Zaman. 1995. Monkey tests for random number generators. Computers & Mathematics with Applications 9 (9):1–10.
  • Mishra, P. R., I. Gupta, and N. R. Pillai. 2011. Generalized avalanche test for stream cipher analysis. In: Security Aspects in Information Technology. InfoSecHiComNet 2011. Lecture Notes in Computer Science, eds. M. Joye, D. Mukhopadhyay, M. Tunstall. Vol 7011. Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-24586-2_15.
  • Montgomery, D. C. 2003. Applied statistics and probability for engineers. New Jersey, USA: John Wiley & Sons, Inc.
  • Pearson, K. 1948. Contributions to the mathematical theory of evolution. II: Skew variation in homogeneous material. In Karl Pearson’s early statistical papers. Cambridge: Cambridge University Press. pp. 41 (First published in 1895 in Philos. Trans. Roy. Soc. Lond. Ser. A 186, 343–414).
  • Rukhin, A, et al. 2010. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22 Revision 1a.
  • Shannon, C. E. 1949. Communication theory of secrecy systems. Bell System Technical Journal 28 (4):656–715. doi:10.1002/j.1538-7305.1949.tb00928.x.
  • Stallings, W. 2011. Cryptography and network security principles and practice. New Jersey, USA: Prentice Hall.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.