1. Lecture Notes in Computer Science;M. Bellare,2000
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the Sponge: Authenticated Encryption and Other Applications. In: The Second SHA-3 Candidate Conference (2010)
3. Lecture Notes in Computer Science;A. Biryukov,2007
4. Lecture Notes in Computer Science;J. Daemen,2005
5. Daemen, J., Rijmen, V.: The Pelican MAC Function, IACR ePrint Archive, 2005/088