1. Lecture Notes in Computer Science;M. Feldhofer,2006
2. Preneel, B.: Status and challenges of lightweight crypto. Talk at the Early Symmetric Crypto (ESC) seminar (January 2010)
3. NIST: Cryptographic hash algorithm competition,
http://www.nist.gov/hash-competition
4. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak sponge function family main document. Submission to NIST, Round 2 (2009),
http://keccak.noekeon.org/Keccak-main-2.0.pdf
5. Bernstein, D.J.: CubeHash specification (2.B.1). Submission to NIST, Round 2 (2009),
http://cubehash.cr.yp.to/submission2/spec.pdf