1. Aumasson, J.P., Meier, W.: Zero-sum distinguishers for reduced Keccak-f and for the core functions of luffa and Hamsi. rump session of Cryptographic Hardware and Embedded Systems-CHES 2009, p. 67 (2009)
2. Lecture Notes in Computer Science;Z Bao,2021
3. Bao, Z., Guo, J., Shi, D., Tu, Y.: Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology - CRYPTO 2022, CRYPTO 2022. LNCS, vol. 13507, pp. 64–93. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_3
4. Bertoni, G., Peeters, M., Van Assche, G., et al.: The keccak reference (2011). http://keccak.noekeon.org
5. Biere, A.: CADICAL at the SAT Race 2019 (2019). https://github.com/arminbiere/cadical