1. ATHENa: automated tool for hardware evaluation.
http://cryptography.gmu.edu/athena/
2. Lecture Notes in Computer Science;M-L Akkar,2001
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Building power analysis resistant implementations of Keccak. In: Second SHA-3 Candidate Conference, August 2010
4. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponge functions, January 2011
5. Lecture Notes in Computer Science;G Bertoni,2012