{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:48:17Z","timestamp":1747176497076,"version":"3.40.5"},"reference-count":60,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,5,3]]},"DOI":"10.1080\/01611194.2022.2155093","type":"journal-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T10:22:23Z","timestamp":1675074143000},"page":"219-251","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Statistical tests suites analysis methods. Cryptographic recommendations"],"prefix":"10.1080","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5591-4550","authenticated-orcid":false,"given":"Elena","family":"Almaraz Luengo","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,1,30]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2018.1548390"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1214\/22-SS136"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12094230"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447773"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2022.127116"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24050613"},{"key":"e_1_3_4_8_1","volume-title":"Simulation modeling and analysis with ARENA","author":"Altiok T.","year":"2007","unstructured":"Altiok, T., and B. Melamed. 2007. Simulation modeling and analysis with ARENA. United States of America: Elsevier Science & Technology."},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.065"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2471279"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/bimj.200900299"},{"key":"e_1_3_4_12_1","unstructured":"Brown R. G. D. Eddelbuettel and D. Bauer. 2014. Dieharder: A random number test suite (version 3.31.1). https:\/\/webhome.phy.duke.edu\/rgb\/General\/dieharder.php."},{"issue":"1","key":"e_1_3_4_13_1","first-page":"1","article-title":"A systematic approach of NIST statistical tests dependencies","volume":"5","author":"Burciu P.","year":"2019","unstructured":"Burciu, P., and E. Simion. 2019. A systematic approach of NIST statistical tests dependencies. Journal of Electrical Engineering, Electronics, Control and Computer Science 5 (1):1\u20136.","journal-title":"Journal of Electrical Engineering, Electronics, Control and Computer Science"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2714842"},{"key":"e_1_3_4_15_1","volume-title":"Elements of information theory","author":"Cover T. M.","year":"2006","unstructured":"Cover, T. M., and J. A. Thomas. 2006. Elements of information theory. 2nd ed. Hoboken, New Jersey: John Wiley & Sons.","edition":"2"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_3_4_17_1","unstructured":"Do\u011fanaksoy A. B. Ege and K. Mus. 2008. Extended results for independence and sensitivity of NIST randomness tests. Paper presented at the Proceedings of the Information Security and Cryptography Conference ISC Turkey Ankara Turkey December 25\u201327 190\u20134."},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1503-214"},{"key":"e_1_3_4_19_1","first-page":"12","volume-title":"FIPS Pub 140-2: Security requirements for cryptographic modules","author":"Evans D. L.","year":"2002","unstructured":"Evans, D. L., P. Bond, and A. Bement. 2002. FIPS Pub 140-2: Security requirements for cryptographic modules. Gaithersburg, MD: Federal Information Processing Standards Publication, 12."},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05149-9_4"},{"issue":"6","key":"e_1_3_4_21_1","first-page":"956","article-title":"On the relativity of binary derivation and autocorrelation randomness test","volume":"46","author":"Fan L.","year":"2009","unstructured":"Fan, L., D. Feng, and H. Chen. 2009. On the relativity of binary derivation and autocorrelation randomness test. Journal of Computer Research and Development 46 (6):956\u201361.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2000.816305"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2017.8166460"},{"key":"e_1_3_4_24_1","volume-title":"Permutation tests: A practical guide to resampling methods for testing hypotheses","author":"Good P.","year":"2013","unstructured":"Good, P. 2013. Permutation tests: A practical guide to resampling methods for testing hypotheses. New York: Springer Science & Business Media."},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/945511.945515"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110191889897"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2017.7969470"},{"key":"e_1_3_4_28_1","unstructured":"Hortelano J. 2022. Cobertura de una bater\u00eda estad\u00edstica. Caso de estudio. Final degree thesis. Supervisor Elena Almaraz Luengo Universidad Complutense de Madrid."},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988505"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2015.1084959"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/e22070741"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2010.12.014"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2550424"},{"key":"e_1_3_4_34_1","volume-title":"The art of computer programming","author":"Knuth D. E.","year":"1997","unstructured":"Knuth, D. E. 1997. The art of computer programming. Vol. 2: Seminumerical algorithms. 3rd. ed. Boston, MA: Addison-Wesley Longman Publishing Co., Inc.","edition":"3"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/e19110631"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2021.126546"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169249"},{"key":"e_1_3_4_38_1","first-page":"1","volume-title":"Entropy and mutual information","author":"Learned-Miller E. G.","year":"2013","unstructured":"Learned-Miller, E. G. 2013. Entropy and mutual information. Amherst: Department of Computer Science, University of Massachusetts, 1\u20134."},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-2494-4_4"},{"key":"e_1_3_4_41_1","unstructured":"Marsaglia G. 1995. The Marsaglia random number CDROM including the Diehard battery of tests of randomness. https:\/\/web.archive.org\/web\/20160220101002\/http:\/\/stat.fsu.edu\/pub\/diehard\/."},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v007.i03"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-8122-8"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119391867764"},{"key":"e_1_3_4_45_1","volume-title":"The basic practice of statistics with CDROM","author":"Moore D. S.","year":"1999","unstructured":"Moore, D. S. 1999. The basic practice of statistics with CDROM. 2nd ed. New York: W. H. Freeman & Co.","edition":"2"},{"key":"e_1_3_4_46_1","unstructured":"NIST. 2001. FIPS 140-2. Security requirements for cryptographic modules (Tech. Rep.) Gaithersburg MD. https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/2\/final."},{"key":"e_1_3_4_47_1","unstructured":"NIST. 2019. FIPS 140-3. Security requirements for cryptographic modules (Tech. Rep.) Gaithersburg MD. https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/3\/final."},{"key":"e_1_3_4_48_1","unstructured":"Press W. H. S. A. Teukolsky W. T. Vetterling and B. P. Flannery. 1992. Numerical recipes in C: The art of scientific computing. Cambridge University Press. http:\/\/lib-www.lanl.gov\/numerical\/bookcpdf.html."},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-117791832760"},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119691884942"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118631980"},{"key":"e_1_3_4_52_1","unstructured":"Rukhin A. L. J. Soto J. R. Nechvatal M. E. Smid E. Barker and S. Leigh. 2010. SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. Rep. Gaithersburg MD."},{"key":"e_1_3_4_53_1","volume-title":"The mathematical theory of communication","author":"Shannon C. E.","year":"1962","unstructured":"Shannon, C. E., and W. Weaver. 1962. The mathematical theory of communication. Paperback ed. Urbana: University of Illinois Press."},{"key":"e_1_3_4_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2009.35"},{"key":"e_1_3_4_55_1","article-title":"Randomness testing of the AES candidate algorithms","volume":"12","author":"Soto J.","year":"1999","unstructured":"Soto, J. 1999. Randomness testing of the AES candidate algorithms. NIST AES Report, 12:1\u20139.","journal-title":"NIST AES Report"},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1605-212"},{"key":"e_1_3_4_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85912-3_2"},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118291857145"},{"key":"e_1_3_4_59_1","unstructured":"Walker J. 2008. ENT: A pseudorandom number sequence test program. https:\/\/www.fourmilab.ch\/random\/."},{"key":"e_1_3_4_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.005"},{"key":"e_1_3_4_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110091888745"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2022.2155093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T09:18:21Z","timestamp":1711012701000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2022.2155093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,30]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5,3]]}},"alternative-id":["10.1080\/01611194.2022.2155093"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2022.2155093","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"type":"print","value":"0161-1194"},{"type":"electronic","value":"1558-1586"}],"subject":[],"published":{"date-parts":[[2023,1,30]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}