1. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: Ketje v2. Submission to CAESAR: Competition for Authenticated Encryption. Security, Applicability, and Robustness (Round 3) (2014).
http://competitions.cr.yp.to/round3/ketjev2.pdf
2. Information Security and Cryptography;J Daemen,2002
3. Eichlseder, M., Kales, D.: Clustering related-tweak characteristics: application to MANTIS-6. IACR Trans. Symmetric Cryptol. 2018(2), 111–132 (2018).
https://doi.org/10.13154/tosc.v2018.i2.111-132
4. Eichlseder, M., Kales, D., Schofnegger, M.: Official Comment: FlexAEAD. Posting on the NIST LWC mailing list.
https://groups.google.com/a/list.nist.gov/d/msg/lwc-forum/cRjs9x43G2I/KsBQLdDODAAJ
5. Lecture Notes in Computer Science;CS Jutla,2001