I. Bassham and L. E. , The advanced encryption standard algorithm validation suite (aesavs), 2002.

K. Z. Bell and M. A. Vouk, On effectiveness of pairwise methodology for testing network-centric software, 2005 International Conference on Information and Communication Technology, pp.221-235, 2005.

L. S. Ghandehari, Y. Lei, T. Xie, R. Kuhn, and R. Kacker, Identifying failureinducing combinations in a combinatorial test set, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.370-379, 2012.

M. Grindal and J. Offutt, Input parameter modeling for combination strategies, Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering, pp.255-260, 2007.

A. Holzinger, P. Kieseberg, E. Weippl, and A. M. Tjoa, Current advances, trends and challenges of machine learning and knowledge extraction: From machine learning to explainable ai, Machine Learning and Knowledge Extraction, pp.1-8, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02060058

, ISO/IEC JTC 1/SC 27: Information technology -Security techniques -Security requirements for cryptographic modules, 2012.

D. R. Kuhn, R. N. Kacker, and Y. Lei, Estimating t-way fault profile evolution during testing, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol.2, pp.596-597, 2016.

D. R. Kuhn and V. Okum, Pseudo-exhaustive testing for software, 30th Annual IEEE/NASA Software Engineering Workshop, pp.153-158, 2006.

D. R. Kuhn and M. J. Reilly, An investigation of the applicability of design of experiments to software testing, 27th Annual NASA Goddard/IEEE Software Engineering Workshop, pp.91-95, 2002.

D. R. Kuhn, D. R. Wallace, and A. M. Gallo, Software fault interactions and implications for software testing, IEEE Transactions on Software Engineering, vol.30, issue.6, pp.418-421, 2004.

D. R. Kuhn, R. N. Kacker, and Y. Lei, Combinatorial coverage as an aspect of test quality, CrossTalk, vol.28, issue.2, pp.19-23, 2015.

D. Kuhn, R. Kacker, and Y. Lei, Introduction to Combinatorial Testing. Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series, 2013.

M. Leithner, K. Kleine, and D. E. Simos, CAmetrics: A tool for advanced combinatorial analysis and measurement of test sets, 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp.318-327, 2018.

I. D. Mendoza, D. R. Kuhn, R. N. Kacker, and Y. Lei, Ccm: A tool for measuring combinatorial coverage of system state space, 2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, pp.291-291, 2013.

N. Mouha, M. S. Raunak, D. R. Kuhn, and R. Kacker, Finding bugs in cryptographic hash function implementations, IEEE Transactions on Reliability, vol.67, issue.3, pp.870-884, 2018.

, National Institue of Standards and Technology: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, vol.17, 2001.

, National Institue of Standards and Technology: Cryptographic algorithm validation program, 2019.

, National Institue of Standards and Technology: Cryptographic module validation program, 2019.

, FIPS 140-3 Development, 2019.

D. E. Simos, K. Kleine, A. G. Voyiatzis, R. Kuhn, and R. Kacker, TLS cipher suites recommendations: A combinatorial coverage measurement approach, Software Quality, Reliability and Security (QRS), 2016 IEEE International Conference on, pp.69-73, 2016.

D. E. Simos, R. Kuhn, A. G. Voyiatzis, and R. Kacker, Combinatorial methods in security testing, Computer, vol.49, issue.10, pp.80-83, 2016.

D. R. Wallace and D. R. Kuhn, Failure modes in medical device software: An analysis of 15 years of recall data, International Journal of Reliability, Quality and Safety Engineering, vol.08, issue.04, pp.351-371, 2001.