1. Ahmadi, H., Safavi-Naini, R.: Detection of algebraic manipulation in the presence of leakage. Information Theoretic Security - ICITS 2013, Lecture Notes in Computer Science, vol. 8317, pp 238–258. Springer, Cham (2013)
2. Akdemir, K.D., Wang, Z., Karpovsky, M., Sunar, B.: Design of cryptographic devices resilient to fault injection attacks using nonlinear robust codes. Fault analysis in cryptography, pp 171–199. Springer, Berlin (2012)
3. Alekseev, M.: On encoding polynomials for strong algebraic manipulation detection codes. Electron Notes Discrete Math. 57, 3–8 (2017)
4. Alekseev, M.: On strengthening of weak algebraic manipulation detection codes. International Journal of Embedded and Real-Time Communication Systems 6(2), 1–26 (2015)
5. Bao, J., Ji, L., Wei, R., Zhang, Y.: New existence and nonexistence results for strong external difference families. Discret. Math. 341(6), 1798–1805 (2018)