{"id":"https://openalex.org/W7126092037","doi":"https://doi.org/10.1109/access.2026.3659273","title":"Cryptographic Randomness Testing of Block Ciphers: SAC Tests","display_name":"Cryptographic Randomness Testing of Block Ciphers: SAC Tests","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7126092037","doi":"https://doi.org/10.1109/access.2026.3659273"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3659273","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3659273","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3659273","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102761194","display_name":"Melis ASLAN","orcid":"https://orcid.org/0000-0002-3964-6875"},"institutions":[{"id":"https://openalex.org/I201799495","display_name":"Middle East Technical University","ror":"https://ror.org/014weej12","country_code":"TR","type":"education","lineage":["https://openalex.org/I201799495"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Mel\u0131s Aslan","raw_affiliation_strings":["Department of Mathematics, Middle East Technical University, Ankara, T&#x00FC;rkiye"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Middle East Technical University, Ankara, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I201799495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029635369","display_name":"Ali Do\u011fanaksoy","orcid":"https://orcid.org/0000-0002-3055-9863"},"institutions":[{"id":"https://openalex.org/I201799495","display_name":"Middle East Technical University","ror":"https://ror.org/014weej12","country_code":"TR","type":"education","lineage":["https://openalex.org/I201799495"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Al\u0131 Do\u011fanaksoy","raw_affiliation_strings":["Department of Mathematics, Middle East Technical University, Ankara, T&#x00FC;rkiye"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Middle East Technical University, Ankara, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I201799495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093410355","display_name":"Sermin Kocaman","orcid":"https://orcid.org/0000-0001-8334-8587"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Serm\u0131n Kocaman","raw_affiliation_strings":["FAME Crypt, Ankara, T&#x00FC;rkiye"],"raw_orcid":"https://orcid.org/0000-0001-8334-8587","affiliations":[{"raw_affiliation_string":"FAME Crypt, Ankara, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018579429","display_name":"Z\u00fclf\u00fckar SAYGI","orcid":null},"institutions":[{"id":"https://openalex.org/I13236232","display_name":"TOBB University of Economics and Technology","ror":"https://ror.org/03ewx7v96","country_code":"TR","type":"education","lineage":["https://openalex.org/I13236232"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Z\u00fclf\u00fckar Saygi","raw_affiliation_strings":["Department of Mathematics, TOBB University of Economics and Technology, Ankara, T&#x00FC;rkiye"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, TOBB University of Economics and Technology, Ankara, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I13236232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066009617","display_name":"Fatih Sulak","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126406","display_name":"Xuzhou Construction Machinery Group (China)","ror":"https://ror.org/02y5rmj89","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210126406"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fat\u0131h Sulak","raw_affiliation_strings":["Department of Mathematics, At&#x0131;l&#x0131;m University, Ankara, T&#x00FC;rkiye"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, At&#x0131;l&#x0131;m University, Ankara, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I4210126406"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102761194"],"corresponding_institution_ids":["https://openalex.org/I201799495"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16988453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"17080","last_page":"17090"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7910000085830688,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7910000085830688,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.18479999899864197,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.006000000052154064,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.817799985408783},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8136000037193298},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7287999987602234},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.6132000088691711},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5950000286102295},{"id":"https://openalex.org/keywords/randomness-tests","display_name":"Randomness tests","score":0.5679000020027161},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.4803999960422516},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.4521999955177307}],"concepts":[{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.817799985408783},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8136000037193298},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7287999987602234},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7059999704360962},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6132000088691711},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5950000286102295},{"id":"https://openalex.org/C18017163","wikidata":"https://www.wikidata.org/wiki/Q13560113","display_name":"Randomness tests","level":3,"score":0.5679000020027161},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.4803999960422516},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48030000925064087},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.4521999955177307},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4447999894618988},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4147000014781952},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.36570000648498535},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.33009999990463257},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.28940001130104065},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.2838999927043915},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.2777000069618225},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.27730000019073486},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.26080000400543213},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2026.3659273","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3659273","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:dbcdcaf289f443a19493f5bfa4bb2730","is_oa":true,"landing_page_url":"https://doaj.org/article/dbcdcaf289f443a19493f5bfa4bb2730","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 17080-17090 (2026)","raw_type":"article"},{"id":"pmh:oai:https://open.metu.edu.tr:11511/118617","is_oa":true,"landing_page_url":"https://hdl.handle.net/11511/118617","pdf_url":null,"source":{"id":"https://openalex.org/S4306402495","display_name":"OpenMETU (Middle East Technical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I201799495","host_organization_name":"Middle East Technical University","host_organization_lineage":["https://openalex.org/I201799495"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3659273","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3659273","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1495318773","https://openalex.org/W1505561248","https://openalex.org/W1517403092","https://openalex.org/W1528318981","https://openalex.org/W1572300106","https://openalex.org/W1629301835","https://openalex.org/W1670558497","https://openalex.org/W1894646615","https://openalex.org/W1963898916","https://openalex.org/W1964723977","https://openalex.org/W1976634091","https://openalex.org/W2896572193","https://openalex.org/W3140432360","https://openalex.org/W4220851523","https://openalex.org/W4240963859","https://openalex.org/W4243494487","https://openalex.org/W4390176420","https://openalex.org/W4392961571","https://openalex.org/W4402766321","https://openalex.org/W4415282237"],"related_works":[],"abstract_inverted_index":{"Block":[0],"ciphers":[1],"are":[2,117,131,138],"designed":[3],"to":[4,14,61,102,144,148],"function":[5],"as":[6],"random":[7],"mappings,":[8],"making":[9],"it":[10,150],"essential":[11],"for":[12,46,107,119,140],"them":[13],"successfully":[15],"pass":[16],"statistical":[17],"randomness":[18,72,110],"tests.":[19],"These":[20],"tests":[21,101,116,157],"evaluate":[22],"whether":[23],"the":[24,39,43,52,56,69,75,82,89,92,108,120],"distribution":[25,45],"of":[26,38,55,68,84,111,122,168],"a":[27,85,164],"test":[28],"statistic,":[29],"derived":[30],"empirically":[31],"through":[32],"various":[33],"data":[34],"manipulations":[35],"over":[36,91],"states":[37],"algorithm,":[40],"aligns":[41],"with":[42,133],"theoretical":[44],"cryptographic":[47,53,71,109],"randomness.":[48,169],"Beyond":[49],"this,":[50,149],"evaluating":[51],"properties":[54,73],"algorithm":[57],"is":[58,74,151],"also":[59],"important":[60,70],"ensure":[62],"its":[63],"security":[64],"and":[65,125],"reliability.":[66],"One":[67],"Strict":[76],"Avalanche":[77],"Criterion":[78],"(SAC),":[79],"which":[80,137],"assesses":[81],"impact":[83],"one-bit":[86],"alteration":[87],"in":[88],"input":[90],"output.":[93],"In":[94],"this":[95],"work,":[96],"we":[97],"introduce":[98],"new":[99],"SAC-based":[100],"offer":[103],"more":[104,165],"reliable":[105],"evaluation":[106,135],"block":[112,127,145],"cipher":[113],"algorithms.":[114],"The":[115,129],"utilized":[118],"application":[121],"AES,":[123],"PRESENT,":[124],"CLEFIA":[126],"ciphers.":[128,146],"results":[130],"compared":[132],"Soto\u2019s":[134,160],"methods,":[136],"known":[139],"their":[141],"comprehensive":[142,166],"approach":[143],"According":[147],"apparent":[152],"that":[153],"our":[154],"novel":[155],"SAC":[156],"improve":[158],"upon":[159],"results,":[161],"thus":[162],"providing":[163],"understanding":[167]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-30T00:00:00"}
