1. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (2018). https://competitions.cr.yp.to/caesar.html
2. Anand, R., et al.: An ultra-high throughput AES-based authenticated encryption scheme for 6G: design and implementation. In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds.) ESORICS 2023. LNCS, vol. 14344, pp. 229–248. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-50594-2_12
3. Lecture Notes in Computer Science;O Bailleux,2003
4. Intel Corporation: Intel® Intrinsics Guide (2024). https://software.intel.com/sites/landingpage/IntrinsicsGuide/. Accessed 03 July 2024
5. Denis, F., Lucas, S.: The AEGIS Family of Authenticated Encryption Algorithms. Internet-Draft draft-irtf-cfrg-aegis-aead-10, Internet Engineering Task Force (2024). Work in Progress