1. Aagaard, M., AlTawy, R., Gong, G., Mandal, K., Rohit, R.: Ace: an authenticated encryption and hash algorithm (2019)
2. Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations. Cryptology ePrint Archive, Report 2014/413 (2014). http://eprint.iacr.org/2014/413
3. Banik, S., et al.: Gift-COFB (2019)
4. Bao, Z., et al.: Photon-Beetle authenticated encryption and hash family (2019)
5. Barthe, G., et al.: Strong non-interference and type-directed higher-order masking. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) ACM CCS 2016, pp. 116–129. ACM Press, New York (2016)