1. Lecture Notes in Computer Science;O Acıiçmez,2006
2. Andreeva, E., Bilgin, B., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: PRIMATEs v1 - Submission to the CAESAR Competition. CAESAR First Round Submission, March 2014.
http://competitions.cr.yp.to/round1/primatesv1.pdf
3. Aumasson, J.-P., Jovanovic, P., Neves, S.: CAESAR submission: NORX v1. CAESAR First Round Submission, March 2014.
http://competitions.cr.yp.to/round1/norxv1.pdf
4. Barreto, P.S.L.M., Rijmen, V.: The Whirlpool hashing function. NESSIE Algorithm Specification, 2000, revised May 2003.
http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html
5. Bernstein, D.J.: Cache-timing attacks on AES. Technical report, University of Chigaco, 2005.
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf