메뉴 건너뛰기




Volumn 8, Issue 3, 2014, Pages 478-489

A property-based testing framework for encryption programs

Author keywords

encryption programs; metamorphic testing (MT); software testing; test oracles

Indexed keywords

ALGORITHMS; SOFTWARE TESTING;

EID: 84901985860     PISSN: 20952228     EISSN: 20952236     Source Type: Journal    
DOI: 10.1007/s11704-014-3040-y     Document Type: Article
Times cited : (12)

References (52)
  • 4
    • 40149084776 scopus 로고    scopus 로고
    • Rule-based static analysis of network protocol implementations
    • Udrea O, Lumezanu C, Foster J S. Rule-based static analysis of network protocol implementations. Information and Computation, 2008, 206(2-4): 130-157.
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 130-157
    • Udrea, O.1    Lumezanu, C.2    Foster, J.S.3
  • 5
    • 84901978860 scopus 로고    scopus 로고
    • Formal verification of security protocol implementations: a survey
    • Avalle M, Pironti A, Sisto R. Formal verification of security protocol implementations: a survey. Formal Aspects of Computing, 2012, 24(12): 1-25.
    • (2012) Formal Aspects of Computing , vol.24 , Issue.12 , pp. 1-25
    • Avalle, M.1    Pironti, A.2    Sisto, R.3
  • 12
    • 0020204093 scopus 로고
    • On testing non-testable programs
    • Weyuker E J. On testing non-testable programs. The Computer Journal. 1982, 25(4): 465-470.
    • (1982) The Computer Journal. , vol.25 , Issue.4 , pp. 465-470
    • Weyuker, E.J.1
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 18
    • 63149180343 scopus 로고    scopus 로고
    • An innovative approach for testing bioinformatics programs using metamorphic testing
    • Chen T Y, Ho J W, Liu H, Xie X. An innovative approach for testing bioinformatics programs using metamorphic testing. BMC Bioinformatics, 2009, 10: 24.
    • (2009) BMC Bioinformatics , vol.10 , pp. 24
    • Chen, T.Y.1    Ho, J.W.2    Liu, H.3    Xie, X.4
  • 22
    • 0017959155 scopus 로고
    • Hints on test data selection: help for the practicing programmer
    • DeMillo R, Lipton R J, Sayward F G. Hints on test data selection: help for the practicing programmer. IEEE Computer, 1978, 11(4): 34-41.
    • (1978) IEEE Computer , vol.11 , Issue.4 , pp. 34-41
    • DeMillo, R.1    Lipton, R.J.2    Sayward, F.G.3
  • 30
    • 84902006942 scopus 로고    scopus 로고
    • Teaching the RSA algorithm using spreadsheets
    • H. B. Zeng. Teaching the RSA algorithm using spreadsheets. Journal of Computing Sciences in Colleges, 2012, 28(1): 18-24.
    • (2012) Journal of Computing Sciences in Colleges , vol.28 , Issue.1 , pp. 18-24
    • Zeng, H.B.1
  • 35
  • 48
    • 70350523582 scopus 로고    scopus 로고
    • Fault detection structures of the S-boxes and the inverse S-boxes for the advanced encryption standard
    • Mozaffari-Kermani M, Reyhani-Masoleh A. Fault detection structures of the S-boxes and the inverse S-boxes for the advanced encryption standard. Journal of Electronic Testing, 2009, 25(4-5): 225-245.
    • (2009) Journal of Electronic Testing , vol.25 , Issue.4-5 , pp. 225-245
    • Mozaffari-Kermani, M.1    Reyhani-Masoleh, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.