1. Abed, F., Forler, C., Lucks, S.: General overview of the first-round CAESAR candidates for authenticated encryption. IACR ePrint 2014/792 (2014). https://eprint.iacr.org/2014/792 . Accessed 27 Nov 2015
2. Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Mouha, N., Yasuda, K.: How to securely release unverified plaintext in authenticated encryption. IACR ePrint 2014/144 (2014). https://eprint.iacr.org/2014/144 . Accessed 27 Nov 2015
3. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, New York (2011). doi: 10.1007/978-3-642-28496-0_19
4. Bertoni, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: CAESAR submission: Keyak v1. CAESAR first round submission (2014). http://competitions.cr.yp.to/round1/keyakv1.pdf . Accessed 27 Nov 2015
5. Biryukov, A., Khovratovich, D.: PAEQv1. CAESAR first round submission (2014). http://competitions.cr.yp.to/round1/paeqv1.pdf . Accessed 27 Nov 2015