1. Misuse-resistant MGM2 mode;Akhmetzyanova L., Alekseev E., Babueva A., Bozhko A., Smyshlyaev S.;Int. J. Open Inf. Technologies,2022
2. On Internal Re-keying
3. How to Securely Release Unverified Plaintext in Authenticated Encryption
4. Mode-level vs. implementation-level physical security in symmetric cryptography: A practical guide through the leakage-resistance jungle;Bellizia D., Bronchain O., Cassiers G., Grosso V., Guo C., Momin C., Pereira O., Peters T., Standaert F.X.,2020
5. On the Memory Fault Resilience of TLS 1.3