1. BARD, G.: Algebraic Cryptanalysis. Springer Science & Business Media, Dordrecht, 2009.
2. BERTONI, G.—DAEMEN, J.—PEETERS, M.—VAN ASSCHE, G.: Cryptographic Sponge Functions. In: ECRYPT hash workshop Vol. 9 (2007), (The results of this initial search was in January 2007), Citeseer (2011), pp. 1–93. http://sponge.noekeon.org/
3. BERTONI, G.—DAEMEN, J.—PEETERS, M.—VAN ASSCHE, G.: Keccak sponge function family main document, Submission to NIST (Round 2) 3 (2009), 320–337.
4. DAEMEN, J.—RIJMEN, V.: The Design of Rijndael. AES—The Advanced Encryption Standard. Information Security and Cryptography. Springer-Verlag, Berlin, 2002.
5. DOBRAUNIG, C.—EICHLSEDER, M.—MENDEL, F.—SCHLÄFFER, M.: Ascon--Authenticated Encryption and Hashing. https://ascon.iaik.tugraz.at/index.html.