1. CAESAR: Competition for authenticated encryption: Security, applicability, and robustness (2014).
http://competitions.cr.yp.to/caesar.html
2. Agrawal, M., Chang, D., Sanadhya, S.: A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Cryptology ePrint Archive, Report 2015/331 (2015).
http://eprint.iacr.org/
3. Andreeva, E., Bilgin, B., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: APE: Authenticated permutation-based encryption for lightweight cryptography. IACR Cryptology ePrint Archive 2013, 791 (2013)
4. Bellare, M., Namprempre, C.: Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. J. Cryptol. 21(4), 469–491 (2008)
5. Lecture Notes in Computer Science;M Bellare,2000