1. Cryptographic competitions: Caesar. http://competitions.cr.yp.to/caesar-call.html
2. Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Aes-copa v. 2 (2015). http://competitions.cr.yp.to/round2/aescopav2.pdf
3. Bay, A., Ersoy, O., Karakoç, F.: Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm. Cryptology ePrint Archive, report 2016/640 (2016). http://eprint.iacr.org
4. Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
5. Lecture Notes in Computer Science;S Contini,2006