-
arXiv:1708.08542 [pdf, ps, other]
Verified Correctness and Security of mbedTLS HMAC-DRBG
Abstract: We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof. We have also proved that the mbedTLS implementation (C program) correctly implements this functional specification. That proof composes with an existing C compiler correctness proof to guarantee, end-to-end, th… ▽ More
Submitted 28 August, 2017; originally announced August 2017.
Comments: Appearing in CCS '17
-
arXiv:math/0503678 [pdf, ps, other]
Geometric isomorphism and minimum aberration for factorial designs with quantitative factors
Abstract: Factorial designs have broad applications in agricultural, engineering and scientific studies. In constructing and studying properties of factorial designs, traditional design theory treats all factors as nominal. However, this is not appropriate for experiments that involve quantitative factors. For designs with quantitative factors, level permutation of one or more factors in a design matrix c… ▽ More
Submitted 29 March, 2005; originally announced March 2005.
Comments: Published at http://dx.doi.org/10.1214/009053604000000599 in the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Report number: IMS-AOS-AOS257 MSC Class: 62K15; 62K20. (Primary)
Journal ref: Annals of Statistics 2004, Vol. 32, No. 5, 2168-2185