1. The CAESAR committee, CAESAR: competition for authenticated encryption: security, applicability, and robustness (2014). https://competitions.cr.yp.to/caesar-submissions.html
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: ECRYPT Hash Workshop, no. 9 (2007)
3. Bouillaguet, C., Delaplace, C., Trimoska, M.: A simple deterministic algorithm for systems of quadratic polynomials over F$${}_{\text{2}}$$. In: Bringmann, K., Chan, T. (eds.) 5th Symposium on Simplicity in Algorithms, SOSA@SODA 2022, Virtual Conference, 10–11 January 2022, pp. 285–296. SIAM (2022). https://doi.org/10.1137/1.9781611977066.22
4. Bovy, E., Daemen, J., Mennink, B.: Comparison of the second round candidates of the NIST lightweight cryptography competition. Bachelor thesis, Radboud University (2020)
5. Lecture Notes in Computer Science;I Dinur,2012