1. Lecture Notes in Computer Science;A Biryukov,2014
2. Bleichenbacher, D., Desai, A.: A construction of a super-pseudorandom cipher, February 1999. Unpublished manuscript
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document. Submission to NIST (Round 2) (2009). http://keccak.noekeon.org/Keccak-main-2.0.pdf
4. Biryukov, A., Khovratovich, D.: Decomposition attack on SASASASAS. http://eprint.iacr.org/2015/646
5. Lecture Notes in Computer Science;DJ Bernstein,2017