1. Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63: 131101
2. Yang J, Johansson T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci China Inf Sci, 2020, 63: 220301
3. Dobraunig C, Eichlseder M, Mendel F, et al. 2016. Ascon-submission to the CAESAR competition. http://ascon.iaik.tugraz.at
4. Wu H, Preneel B. AEGIS: a fast authenticated encryption algorithm (v1.1). http://competitions.cr.yp.to/round3/aegisv11.pdf.2016
5. Jean J, Nikolic I, Peyrin T, et al. Deoxys v1.41. http://competitions.cr.yp.to/round3/deoxysv141.pdf. 2016