1. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness, March 2013.
http://competitions.cr.yp.to/caesar.html
2. Bertoni, G., Daemen, J., Debande, N., Le, T.-H., Peeters, M., Van Assche, G.: Power analysis of hardware implementations protected with secret sharing. Cryptology ePrint Archive: Report 2013/067, February 2013
3. Lecture Notes in Computer Science;G Bertoni,2012
4. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: Keccak Implementation Overview, May 2012.
http://keccak.noekeon.org/Keccak-implementation-3.2.pdf
(Version 3.2)
5. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: ECRYPT Hash Workshop, Barcelona, Spain, 24–25 May 2007.
http://sponge.noekeon.org/SpongeFunctions.pdf