Return to Article Details Statistical tools used in cryptographic evaluation Download Download PDF