1. Descriptions of SHA-256, SHA-384, and SHA-512.
http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf
2. Lecture Notes in Computer Science;L Batina,2013
3. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The Simon and Speck Families of Lightweight Block Ciphers. IACR eprint archive.
https://eprint.iacr.org/2013/404.pdf
4. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak Reference.
http://keccak.noekeon.org/Keccak-reference-3.0.pdf
5. Bertoni, G., Macchetti, M., Negri, L., Fragneto, P.: Power-efficient ASIC synthesis of cryptographic S-boxes. In: Proceedings of the 14th ACM Great Lakes Symposium on VLSI. ACM, pp. 277–281(2004)