1. [1] FIPS PUB 197, “Advanced encryption standard (AES),” 2001.
2. [2] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “Duplexing the sponge: Single-pass authenticated encryption and other applications,” SAC 2011, ed. A. Miri and S. Vaudenay, Lect. Notes Comput. Sci., vol.7118, pp.320-337, Springer, 2011. 10.1007/978-3-642-28496-0_19
3. [3] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “Sponge functions,” ECRYPT Hash Workshop, 2007.
4. [4] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “The KECCAK sponge function family,” 2008. http://keccak.noekeon.org.
5. [5] FIPS PUB 202, “SHA-3 standard: Permutation-based hash and extendable-output functions,” 2015. 10.6028/nist.fips.202