1. Lecture Notes in Computer Science;A Bar-On,2019
2. Bernstein, D.: Caesar: competition for authenticated encryption: Security, applicability, and robustness. https://competitions.cr.yp.to/caesar.html (2013). Accessed 10 May 2021
3. Lecture Notes in Computer Science;G Bertoni,2012
4. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Permutation-based encryption, authentication and authenticated encryption. Directions in Authenticated Ciphers, pp. 159–170 (2012)
5. Lecture Notes in Computer Science;E Biham,2002