1. Farzaneh Abed Christian Forler and Stefan Lucks. 2014. General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition. Technical Report. Cryptology ePrint Archive: Report 2014/792.{2} CAESAR submissions second-round candidates. Available: http://competitions.cr.yp.to/caesar-submissions.html. https://pdfs.semanticscholar.org/9d87/276411a6ea1b1c6b89c7a04306221fc8b8b8.pdf Farzaneh Abed Christian Forler and Stefan Lucks. 2014. General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition. Technical Report. Cryptology ePrint Archive: Report 2014/792.{2} CAESAR submissions second-round candidates. Available: http://competitions.cr.yp.to/caesar-submissions.html. https://pdfs.semanticscholar.org/9d87/276411a6ea1b1c6b89c7a04306221fc8b8b8.pdf
2. Power analysis of hardware implementations protected with secret sharing
3. G. Bertoni J. Daemen M. Peeters and G. Van Assche. 2011. The Keccak reference. (January 2011). http://keccak.noekeon.org/Keccak-reference-3.0.pdf http://keccak.noekeon.org/. G. Bertoni J. Daemen M. Peeters and G. Van Assche. 2011. The Keccak reference. (January 2011). http://keccak.noekeon.org/Keccak-reference-3.0.pdf http://keccak.noekeon.org/.
4. Guido Bertoni Joan Daemen Michaël Peeters and Gilles Van Assche. 2012. Permutation-based encryption authentication and authenticated encryption. Directions in Authenticated Ciphers (2012). Guido Bertoni Joan Daemen Michaël Peeters and Gilles Van Assche. 2012. Permutation-based encryption authentication and authenticated encryption. Directions in Authenticated Ciphers (2012).
5. Guido Bertoni Joan Daemen MichaÃńl Peeters Gilles van Assche and Ronny van Keer. 2016. CAESAR submission: Keyak v2. (2016). http://keyak.noekeon.org/Keyakv2-doc2.2.pdf Guido Bertoni Joan Daemen MichaÃńl Peeters Gilles van Assche and Ronny van Keer. 2016. CAESAR submission: Keyak v2. (2016). http://keyak.noekeon.org/Keyakv2-doc2.2.pdf