1. Caesar: Competition for authenticated encryption: Security, applicability, and robustness.
http://competitions.cr.yp.to/caesar.html
2. Ågren, M., Löndahl, C., Hell, M., Johansson, T.: A survey on fast correlation attacks. Cryptography and Communications 4(3–4), 173–202 (2012)
3. Lecture Notes in Computer Science;C Berbain,2006
4. Chakraborti, A., Nandi, M.: Trivia-ck v1. CAESAR (2014)
5. Chaza, F., McDonald, C., Avanzi, R.: Faser v1: Authenticated encryption in a feedback shift register. CAESAR (2014)