1. ARM. AMBA Open Speci_cations. www.arm.com/products/system-ip/amba, 2014.
2. P. S. L. M. Barreto and V. Rijmen. The Whirlpool hashing function. NESSIE Algorithm Speci_cation www.larc.usp.br/~pbarreto/WhirlpoolPage.html, 2000, Revised May 2003.
3. S. Bartolini, R. Giorgi, and E. Martinelli. Instruction set extensions for cryptographic applications. In _ C. K. Ko_c, editor, Cryptographic Engineering, pages 191--233. Springer, 2009.
4. G. Bertoni, J. Daemen, M. Peeters, G. V. Assche, and R. V. Keer. CAESAR submission: Keyak v1. CAESAR 1st Round, competitions.cr.yp.to/round1/keyakv1.pdf, March 2014.
5. A. Biryukov, D. Khovratovich, and I. Nikoli_c. Distinguisher and related-key attack on the full AES-256. In S. Halevi, editor, CRYPTO '09, volume 5677 of LNCS, pages 231--249. Springer, 2009.