1. Formalizing human ignorance;Rogaway,2006
2. NIST policy on hash functions,2015
3. Revisiting security claims of XLS and COPA;Nandi;IACR Cryptol. ePrint Arch.,2015
4. Parallelizable and authenticated online ciphers;Andreeva,2013
5. Low-memory attacks against two-round even-mansour using the 3-XOR problem;Leurent,2019