1. Bellare M., Desai A., Jokipii E., Rogaway P.: A concrete security treatment of symmetric encryption, In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pp. 394–403, IEEE Computer Society Press (1997).
2. Bellare M., Rogaway P.: Introduction to modern cryptography. In: UCSD CSE, Course Notes, p. 207 (2005).
3. Daemen J.: Cipher and Hash function design, strategies based on linearand differential cryptanalysis. Ph.D. Thesis, Katholieke Universiteit Leuven (1995).
4. Daemen J., Kitsos P.: The self-synchronizing stream cipher moustique. In: New Stream Cipher Designs, The eSTREAM Finalists, pp. 210–223 (2008).
5. Daemen J., Govaerts R., Vandewalle J.: A practical approach to the design of high speed self-synchronizing stream ciphers. In: IEEE ICCS/ISITA 92, Singapore, pp. 279–293 (1992).