Farzaneh Abed, Christian Forler & Stefan Lucks (2014):
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition.
Cryptology ePrint Archive.
Available at http://ia.cr/2014/792.
Robert G. Brown (2004):
Dieharder: A Random Number Test Suite.
http://www.phy.duke.edu/%7Ergb/General/dieharder.php.
CAESAR committee (2013):
CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness.
http://competitions.cr.yp.to/caesar-call.html.
Kelsey Cairns & Graham Steel (2014):
Developer-resistant cryptography.
In: A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT).
Julio Cesar Hernandez Castro, José María Sierra, Andre Seznec, Antonio Izquierdo & Arturo Ribagorda (2005):
The strict avalanche criterion randomness test.
Mathematics and Computers in Simulation 68(1),
pp. 1–7,
doi:10.1016/j.matcom.2004.09.001.
Pierre L'Ecuyer & Richard Simard (2007):
TestU01: A C Library for Empirical Testing of Random Number Generators.
ACM Transactions on Mathematical Software 33(4),
doi:10.1145/1268776.1268777.
David McGrew & John Viega (2004):
The Galois/Counter Mode of Operation (GCM).
Submission to NIST.
Available at http://siswg.net/docs/gcm_spec.pdf.
Mridul Nandi (2014):
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET.
In: Advances in Cryptology – ASIACRYPT 2014 8873.
Springer Berlin Heidelberg,
pp. 126–140,
doi:10.1007/978-3-662-45611-8_7.
Andrew Rukhin (2000):
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.
Technical Report.
National Institute of Standards and Technology (NIST).
Available at http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf.
Markku-Juhani O. Saarinen (2015):
The BRUTUS automatic cryptanalytic framework.
Journal of Cryptographic Engineering 6(1),
pp. 75–82,
doi:10.1007/s13389-015-0114-1.
Emil Simion (2015):
The Relevance of Statistical Tests in Cryptography.
IEEE Security & Privacy,
pp. 66–70,
doi:10.1109/MSP.2015.16.
Marek Sýs, Zdeněk Říha, Václav Matyáš, Kinga Márton & Alin Suciu (2015):
On the Interpretation of Results from the NIST Statistical Test Suite.
Romanian Journal of Information Science and Technology 18(1),
pp. 18–32.
Marek Sýs, Petr Švenda, Martin Ukrop & Vashek Matyáš (2014):
Constructing empirical tests of randomness.
In: SECRYPT 2014 Proceedings of the 11th International Conference on Security and Cryptography.
SCITEPRESS – Science and Technology Publications,
pp. 229–237,
doi:10.5220/0005023902290237.
Meltem Sonmez Turan, Ali Doganaksoy & Çagdas Çalik (2008):
On Statistical Analysis of Synchronous Stream Ciphers.
The Middle East Technical University.
Available at http://etd.lib.metu.edu.tr/upload/12609581/index.pdf.
Martin Ukrop (2016):
Randomness analysis in authenticated encryption systems.
Master thesis.
Faculty of Informatics, Masaryk University.
Available at http://is.muni.cz/th/374297/fi_m/.
Virtual Applications and Implementations Research Lab (2008):
SUPERCOP: System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives.
Available at http://bench.cr.yp.to/supercop.html.
Petr Švenda, Martin Ukrop & Vashek Matyáš (2014):
Determining cryptographic distinguishers for eStream and SHA-3 candidate functions with evolutionary circuits.
In: E-Business and Telecommunications 456.
Springer Berlin Heidelberg,
pp. 290–305,
doi:10.1007/978-3-662-44788-8_17.
A. F. Webster & S. E. Tavares (1986):
On the Design of S-Boxes,
pp. 523–534.
Springer Berlin Heidelberg,
Berlin, Heidelberg,
doi:10.1007/3-540-39799-X_41.