1. Beierle, C., Jean, J., Kölbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: M. Robshaw, J. Katz (eds.) Advances in Cryptology—CRYPTO 2016, pp. 123–153. Springer Berlin Heidelberg, Berlin, Heidelberg (2016). https://link.springer.com/chapter/10.1007/978-3-662-53008-5_5
2. Iwata, T., Khairallah, M., Minematsu, K., Peyrin, T.: Romulus v1.2. NIST Lightweight Cryptography Project (2020). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/Romulus-spec-round2.pdf
3. Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M.: Blockcipher-Based Authenticated Encryption: How Small Can We Go? In: W. Fischer, N. Homma (eds.) Cryptographic Hardware and Embedded Systems – CHES 2017, pp. 277–298. Springer International Publishing, Cham (2017). https://link.springer.com/chapter/10.1007/978-3-319-66787-4_14
4. Krovetz, T., Rogaway, P.: The software performance of authenticated-encryption modes. In: A. Joux (ed.) Fast Software Encryption, pp. 306–327. Springer Berlin Heidelberg, Berlin, Heidelberg (2011). https://link.springer.com/chapter/10.1007/978-3-642-21702-9_18
5. Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: S. Vaudenay (ed.) Advances in Cryptology—EUROCRYPT 2006, pp. 373–390. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https://link.springer.com/chapter/10.1007/11761679_23