1. CAESAR: competition for authenticated encryption: security, applicability, and robustness (2014). http://competitions.cr.yp.to/caesar.html
2. NIST Lightweight cryptography project (2015). https://csrc.nist.gov/Projects/lightweight-cryptography/email-list
3. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak SHA-3 submission in NIST. Submission to NIST (Round 3) (2011). http://keccak.noekeon.org/Keccak-submission-3.pdf
4. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: The Ketje authenticated encryption scheme (2016). https://keccak.team/ketje.html
5. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak reference. Submission to NIST (Round 2), vol. 3, no. 30, pp. 320–337 (2011)