1. Authenticated encryption: relations among notions and analysis of the generic composition paradigm;Bellare,2000
2. M.J. Dworkin, “Recommendation for block cipher modes of operation: the ccm mode for authentication and confidentiality, NIST special publication 800-38C,” 2004.
3. M.J. Dworkin, “Recommendation for block cipher modes of operation: galois/Counter mode (GCM) and GMAC, NIST special publication 800-38D,” 2007.
4. F. Abed, C. Forler, and S. Lucks, “General overview of the first-round caesar candidates for authenticated encryption,” Cryptology ePrint Archive, Report 2014/792. [Online]. Available:https://eprint.iacr.org/2014/792.
5. “CAESAR: Competition For Authenticated Encryption: Security, Applicability, And Robustness.” [Online]. Available: http://competitions.cr.yp.to/caesar.html.