1. Aoki, K., Roland, G., Sasaki, Y., & Schläffer, M. (2011). Byte SLICING Grøstl - Optimized intel AES-NI and 8-bit implementations of the SHA-3 Finalist Grøstl. In Proceedings of The Sixth International Conference on Security and Cryptography (SECRYPT 2011). SciTePress.
2. Aumasson, J.-P., Henzen, L., Meier, W., & Phan, R. C.-W. (2010). SHA-3 proposal BLAKE. Submission to NIST (Round 3).
3. Aumasson, J.-P., Neves, S., Wilcox-O’Hearn, Z., & Winnerlein, C. (2012). Blake2: Simpler, smaller, fast as MD5. Retrieved December 29, 2012, from https://blake2.net/blake2 20121223.pdf
4. Balasch, J., Ege, B., Eisenbarth, T., Gérard, B., Gong, Z., Güneysu, T., ... von Maurich, I. (2012). Compact implementation and performance evaluation of hash functions in attiny devices. Cryptology ePrint Archive, Report 2012/507.
5. Bertoni, G., Daemen, J., Peeters, M., & Assche, G. V. (2011). The Keccak SHA-3 submission. Submission to NIST (Round 3).