The hardware and bandwidth for this mirror is donated by METANET, the Webhosting and Full Service-Cloud Provider.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]metanet.ch.

CryptRndTest: Statistical Tests for Cryptographic Randomness

Performs cryptographic randomness tests on a sequence of random integers or bits. Included tests are greatest common divisor, birthday spacings, book stack, adaptive chi-square, topological binary, and three random walk tests (Ryabko and Monarev, 2005) <doi:10.1016/j.jspi.2004.02.010>. Tests except greatest common divisor and birthday spacings are not covered by standard test suites. In addition to the chi-square goodness-of-fit test, results of Anderson-Darling, Kolmogorov-Smirnov, and Jarque-Bera tests are also generated by some of the cryptographic randomness tests.

Version: 1.2.7
Depends: kSamples, sfsmisc, Rmpfr, parallel
Imports: LambertW, gmp, tseries, methods
Suggests: R.rsp, bbotk
Published: 2022-04-22
DOI: 10.32614/CRAN.package.CryptRndTest
Author: Haydar Demirhan (<https://orcid.org/0000-0002-8565-4710>)
Maintainer: Haydar Demirhan <haydar.demirhan at rmit.edu.au>
License: GPL-3
NeedsCompilation: no
Citation: CryptRndTest citation info
CRAN checks: CryptRndTest results

Documentation:

Reference manual: CryptRndTest.pdf
Vignettes: Details of CryptRndTest Package

Downloads:

Package source: CryptRndTest_1.2.7.tar.gz
Windows binaries: r-devel: CryptRndTest_1.2.7.zip, r-release: CryptRndTest_1.2.7.zip, r-oldrel: CryptRndTest_1.2.7.zip
macOS binaries: r-release (arm64): CryptRndTest_1.2.7.tgz, r-oldrel (arm64): CryptRndTest_1.2.7.tgz, r-release (x86_64): CryptRndTest_1.2.7.tgz, r-oldrel (x86_64): CryptRndTest_1.2.7.tgz
Old sources: CryptRndTest archive

Linking:

Please use the canonical form https://CRAN.R-project.org/package=CryptRndTest to link to this page.

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.