1. G.V. Assche, A rotational distinguisher on Shabal’s keyed permutation and its impact on the security proofs. Available online at
http://gva.noekeon.org/papers/ShabalRotation.pdf
(2010)
2. Lecture Notes in Computer Science;J.-P. Aumasson,2009
3. D.J. Bernstein, Salsa20. Technical Report 2005/025. In eSTREAM. ECRYPT Stream Cipher Project (2005). See
http://cr.yp.to/snuffle.html
4. G. Bertoni, J. Daemen, M. Peeters, G.V. Assche, The Keccak reference, version 3.0 (2011). See
http://keccak.noekeon.org/Keccak-reference-3.0.pdf
5. Lecture Notes in Computer Science;E. Biham,2004