1. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications. Submission to NIST (2008)
2. Bertoni, G., Daemen, J., Assche, G.V., Peeters, M.: Radiogatún, a belt-and-mill hash function. NIST - Second Cryptographic Hash Workshop, August 24-25 (2006)
3. Lecture Notes in Computer Science;J. Blömer,2004
4. Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5/1 (1999), http://jya.com/a51-pi.htm
5. Bringer, J., Chabanne, H.: Trusted-HB: A low-cost version of HB + secure against man-in-the-middle attacks. IEEE Transactions on Information Theory 54(9), 4339–4342 (2008)