1. CAESAR: Competition for authenticated encryption: Security applicability and robustness. https://competitions.cr.yp.to/caeser.html
2. Argen, M., Londhahl, C., Hell, M., Johansson, T.: A survey on fast correlation attack. Crypt. Commun. 4(3), 173–202 (2012)
3. Bellare, M., Kohno, T., Namprempre, C.: Authentication encryption in SSH: provably fixing the SSH binary packet protocol. In: ACM Conference on Computer and Communications Security (CCS-9), pp. 1–31. ACM Press (2002)
4. Lecture Notes in Computer Science;M Bellare,2000
5. Chaza, F., MacDonald, C., Avanzi, R.: FASER v1: Authenticated encryption in a feedback shift register, CAESER (2014)