1. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness.” Internet: http://competitions.cr.yp.to/caesar.html, Jun. 16, 2014 [Mar. 18, 2017].
2. Tweakable block ciphers;Liskov;J. Cryptology,2011
3. The Second SHA-3 Candidate Conference, Papers and Presentations, Santa Barbara, CA, Aug. 23-24, 2010, Internet: http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/Aug2010/documents/Program_SHA3_Aug2010.pdf
[Mar. 18, 2017].
4. E. Homsirikamol, M. Rogawski, K. Gaj, “Comparing Hardware Performance of fourteen round two SHA-3 candidates using FPGAs,” Dec. 21, 2010, Internet: https://eprint.iacr.org/2010/445.pdf
[Mar. 18, 2017].
5. Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs;Gaj,2010