2014
DOI: 10.1007/s11704-014-3040-y
|View full text |Cite
|
Sign up to set email alerts
|

A property-based testing framework for encryption programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Batra and Singh [127] proposed using UML diagrams to guide the selection of metamorphic relations and presented a small case study using a banking application. Sun et al [128] reported several metamorphic relations for encryption programs. Aruna and Prasad [129] presented a small case study on the application of metamorphic testing to two popular graph theory algorithms.…”
Section: Other Domainsmentioning
confidence: 99%
See 1 more Smart Citation
“…Batra and Singh [127] proposed using UML diagrams to guide the selection of metamorphic relations and presented a small case study using a banking application. Sun et al [128] reported several metamorphic relations for encryption programs. Aruna and Prasad [129] presented a small case study on the application of metamorphic testing to two popular graph theory algorithms.…”
Section: Other Domainsmentioning
confidence: 99%
“…where M f r is the number of tests in t derived from the relation r that detect the fault f , and T r is the total number of metamorphic tests derived from r. This metric is also called fault discovery rate [34], [85], [128].…”
Section: Fault Detection Ratiomentioning
confidence: 99%
“…The first paper applying metamorphic testing to encryption was [10]. Sun, Wang, and Wang metamorphically tested both the Hill algorithm and RSA, using mutation analysis, that is, creating mutants and investigating how effectively the tests discover faulty mutants.…”
Section: B Metamorphic Testing and Cryptographymentioning
confidence: 99%
“…However, in [20] MBT is applied at the application level (e.g., sequence of hash function calls), rather than for cryptographic primitives. Metamorphic testing has been applied to various security-related applications [21], and some work has been done towards developing metamorphic relations for cryptographic modules [22].…”
Section: Related Work and Traditional Approachesmentioning
confidence: 99%