1. Lecture Notes in Computer Science;DJ Bernstein,2014
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: Keccak implementation overview, May 2012.
https://keccak.team/files/Keccak-implementation-3.2.pdf
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document. NIST SHA-3 Submission, October 2008.
https://keccak.team/obsolete/Keccak-main-1.0.pdf
4. Bernstein, D.J.: Cache-timing attacks on AES, April 2005.
https://cr.yp.to/antiforgery/cachetiming-20050414.pdf
5. Lecture Notes in Computer Science;DJ Bernstein,2005