1. Authenticated-encryption with associated-data
2. Bertoni , G. , Daemen , J. , Peeters , M. , Van Assche , G. 2012 . Permutation-Based Encryption , Authentication and Authenticated Encryption. In DIAC 2012. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G. 2012. Permutation-Based Encryption, Authentication and Authenticated Encryption. In DIAC 2012.
3. On Generalized Feistel Networks
4. Shannon , C.E. 1949. Communication theory of secrecy systems. The Bell System Technical Journal , Volume: 28, Issue: 4 , pp 656 - 715 . 10.1002/j.1538-7305. 1949 .tb00928.x Shannon, C.E. 1949. Communication theory of secrecy systems. The Bell System Technical Journal, Volume: 28, Issue: 4, pp 656-715. 10.1002/j.1538-7305.1949.tb00928.x