@article(caesar-classification, author = {Farzaneh Abed and Christian Forler and Stefan Lucks}, year = {2014}, title = {General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition}, journal = {Cryptology ePrint Archive}, url = {http://ia.cr/2014/792}, ) @phdthesis(caesar-thesis, author = {Robin Ankele}, year = {2015}, title = {Provable Security of Submissions to the {CAESAR} Cryptographic Competition}, type = {Master thesis}, school = {Graz University of Technology}, url = {https://securewww.esat.kuleuven.be/cosic/publications/thesis-263.pdf}, ) @misc(dieharder, author = {Robert G. Brown}, year = {2004}, title = {Dieharder: A Random Number Test Suite}, howpublished = {\url{http://www.phy.duke.edu/\%7Ergb/General/dieharder.php}}, ) @misc(caesar-competition, author = {{CAESAR committee}}, year = {2013}, title = {CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness}, howpublished = {http://competitions.cr.yp.to/caesar-call.html}, ) @inproceedings(dev-resistant-crypto, author = {Kelsey Cairns and Graham Steel}, year = {2014}, title = {Developer-resistant cryptography}, booktitle = {A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT)}, ) @article(sac-randomness-test, author = {Julio Cesar Hernandez Castro and Jos{\'e} Mar{\'\i}a Sierra and Andre Seznec and Antonio Izquierdo and Arturo Ribagorda}, year = {2005}, title = {The strict avalanche criterion randomness test}, journal = {Mathematics and Computers in Simulation}, volume = {68}, number = {1}, pages = {1--7}, doi = {10.1016/j.matcom.2004.09.001}, ) @article(sha3-statistical-testing, author = {Ali Doganaksoy and Baris Ege and Ko{\c{c}}ak, Onur and Fatih Sulak}, year = {2010}, title = {Statistical Analysis of Reduced Round Compression Functions of {SHA-3} Second Round Candidates}, journal = {IACR Cryptology ePrint Archive}, url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.187.814&rep=rep1&type=pdf}, ) @inproceedings(caesar-survival, author = {Kim Hakju and Kim Kwangjo}, year = {2014}, title = {Who can survive in CAESAR competition at round-zero}, booktitle = {The 31\textsuperscript{th} Symposium on Cryptography and Information Security Kagoshima}, pages = {21--24}, url = {http://caislab.kaist.ac.kr/publication/paper_files/2014/SCIS2014_HJ.pdf}, ) @phdthesis(jakobsson, author = {Krister Sune Jakobsson}, year = {2014}, title = {Theory, Methods and Tools for Statistical Testing of Pseudo and Quantum Random Number Generators}, school = {Link{\"{o}}pings universitet, Sweden}, url = {http://liu.diva-portal.org/smash/record.jsf?pid=diva2\%3A740158&dswid=9282}, ) @article(ae-quote, author = {Tadayoshi Kohno and John Viega and Doug Whiting}, year = {2003}, title = {The {CWC} authenticated encryption (associated data) mode}, journal = {ePrint Archives}, url = {http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/cwc/cwc-spec.pdf}, ) @article(testu01, author = {Pierre L'Ecuyer and Richard Simard}, year = {2007}, title = {TestU01: A C Library for Empirical Testing of Random Number Generators}, journal = {ACM Transactions on Mathematical Software}, volume = {33}, number = {4}, doi = {10.1145/1268776.1268777}, ) @article(gcm, author = {David McGrew and John Viega}, year = {2004}, title = {The {Galois}/Counter Mode of Operation ({GCM})}, journal = {Submission to {NIST}}, url = {http://siswg.net/docs/gcm_spec.pdf}, ) @incollection(caesar-cobra-poet, author = {Mridul Nandi}, year = {2014}, title = {Forging Attacks on Two Authenticated Encryption Schemes {COBRA} and {POET}}, booktitle = {Advances in Cryptology -- ASIACRYPT 2014}, volume = {8873}, publisher = {Springer Berlin Heidelberg}, pages = {126--140}, doi = {10.1007/978-3-662-45611-8_7}, ) @techreport(nist-sts-documentation, author = {Andrew Rukhin}, year = {2000}, title = {A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications}, type = {Technical Report}, institution = {National Institute of Standards and Technology ({NIST})}, url = {http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf}, ) @article(brutus, author = {Markku-Juhani O. Saarinen}, year = {2015}, title = {The {BRUTUS} automatic cryptanalytic framework}, journal = {Journal of Cryptographic Engineering}, volume = {6}, number = {1}, pages = {75--82}, doi = {10.1007/s13389-015-0114-1}, ) @article(ieee-simion2015, author = {Emil Simion}, year = {2015}, title = {The Relevance of Statistical Tests in Cryptography}, journal = {IEEE Security {\&} Privacy}, pages = {66--70}, doi = {10.1109/MSP.2015.16}, ) @article(nist-sts-interpretation-syso, author = {Marek S\'{y}s and \v{R}\'{i}ha, Zdeněk and Maty\'{a}\v{s}, V\'{a}clav and Kinga M\'{a}rton and Alin Suciu}, year = {2015}, title = {On the Interpretation of Results from the NIST Statistical Test Suite}, journal = {Romanian Journal of Information Science and Technology}, volume = {18}, number = {1}, pages = {18--32}, ) @inproceedings(secrypt2014, author = {Marek S\'{y}s and \v{S}venda, Petr and Martin Ukrop and Maty\'{a}\v{s}, Vashek}, year = {2014}, title = {Constructing empirical tests of randomness}, booktitle = {SECRYPT 2014 Proceedings of the 11\textsuperscript{th} International Conference on Security and Cryptography}, publisher = {SCITEPRESS – Science and Technology Publications}, pages = {229--237}, doi = {10.5220/0005023902290237}, ) @phdthesis(estream-statistical-testing, author = {Meltem Sonmez Turan and Ali Doganaksoy and {\c{C}}alik, {\c{C}}agdas}, year = {2008}, title = {On Statistical Analysis of Synchronous Stream Ciphers}, school = {The Middle East Technical University}, url = {http://etd.lib.metu.edu.tr/upload/12609581/index.pdf}, ) @phdthesis(ukrop-mgr, author = {Martin Ukrop}, year = {2016}, title = {Randomness analysis in authenticated encryption systems}, type = {Master thesis}, school = {Faculty of Informatics, Masaryk University}, url = {http://is.muni.cz/th/374297/fi_m/}, ) @misc(supercop, author = {{Virtual Applications and Implementations Research Lab}}, year = {2008}, title = {{SUPERCOP}: System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives}, url = {http://bench.cr.yp.to/supercop.html}, ) @incollection(ccis2014, author = {\v{S}venda, Petr and Martin Ukrop and Maty\'{a}\v{s}, Vashek}, year = {2014}, title = {Determining cryptographic distinguishers for eStream and {SHA-3} candidate functions with evolutionary circuits}, booktitle = {E-Business and Telecommunications}, volume = {456}, publisher = {Springer Berlin Heidelberg}, pages = {290--305}, doi = {10.1007/978-3-662-44788-8_17}, ) @inbook(sac, author = {A. F. Webster and S. E. Tavares}, year = {1986}, title = {On the Design of S-Boxes}, pages = {523--534}, publisher = {Springer Berlin Heidelberg}, address = {Berlin, Heidelberg}, doi = {10.1007/3-540-39799-X_41}, )