The advanced encryption standard algorithm validation suite (aesavs), 2002. ,
On effectiveness of pairwise methodology for testing network-centric software, 2005 International Conference on Information and Communication Technology, pp.221-235, 2005. ,
Identifying failureinducing combinations in a combinatorial test set, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.370-379, 2012. ,
Input parameter modeling for combination strategies, Proceedings of the 25th conference on IASTED International Multi-Conference: Software Engineering, pp.255-260, 2007. ,
Current advances, trends and challenges of machine learning and knowledge extraction: From machine learning to explainable ai, Machine Learning and Knowledge Extraction, pp.1-8, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02060058
, ISO/IEC JTC 1/SC 27: Information technology -Security techniques -Security requirements for cryptographic modules, 2012.
Estimating t-way fault profile evolution during testing, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol.2, pp.596-597, 2016. ,
Pseudo-exhaustive testing for software, 30th Annual IEEE/NASA Software Engineering Workshop, pp.153-158, 2006. ,
An investigation of the applicability of design of experiments to software testing, 27th Annual NASA Goddard/IEEE Software Engineering Workshop, pp.91-95, 2002. ,
Software fault interactions and implications for software testing, IEEE Transactions on Software Engineering, vol.30, issue.6, pp.418-421, 2004. ,
Combinatorial coverage as an aspect of test quality, CrossTalk, vol.28, issue.2, pp.19-23, 2015. ,
, Introduction to Combinatorial Testing. Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series, 2013.
CAmetrics: A tool for advanced combinatorial analysis and measurement of test sets, 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp.318-327, 2018. ,
Ccm: A tool for measuring combinatorial coverage of system state space, 2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, pp.291-291, 2013. ,
Finding bugs in cryptographic hash function implementations, IEEE Transactions on Reliability, vol.67, issue.3, pp.870-884, 2018. ,
, National Institue of Standards and Technology: Recommendation for Block Cipher Modes of Operation: Methods and Techniques, vol.17, 2001.
, National Institue of Standards and Technology: Cryptographic algorithm validation program, 2019.
, National Institue of Standards and Technology: Cryptographic module validation program, 2019.
, FIPS 140-3 Development, 2019.
TLS cipher suites recommendations: A combinatorial coverage measurement approach, Software Quality, Reliability and Security (QRS), 2016 IEEE International Conference on, pp.69-73, 2016. ,
Combinatorial methods in security testing, Computer, vol.49, issue.10, pp.80-83, 2016. ,
Failure modes in medical device software: An analysis of 15 years of recall data, International Journal of Reliability, Quality and Safety Engineering, vol.08, issue.04, pp.351-371, 2001. ,