1. NORX;Aumasson,2014
2. CAESAR: competition for authenticated encryption: security, applicability, and robustness;Bernstein,2014
3. Keccak specifications;Bertoni,2011
4. Efficient and first-order DPA resistant implementations of keccak;Bilgin,2014
5. A more efficient AES threshold implementation;Bilgin,2014