1. Lecture Notes in Computer Science;M.L. Akkar,2001
2. Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., Stütz, G.: Threshold Implementations of all 3×3 and 4×4 S-boxes. Cryptology ePrint Archive, Report 2012/300,
http://eprint.iacr.org/
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications. NIST SHA3 contest 2008 (2008)
4. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Building power analysis resistant implementations of Keccak. Round 3 finalist of the Cryptographic Hash Algorithm Competition of NIST (2010)
5. Lecture Notes in Computer Science;J. Blömer,2004