1. [1] P. Peris-Lopez, et al.: in Emerging Directions in Embedded and Ubiquitous Computing, LNCS, vol. 4809 (Springer, 2007) 781–794.
2. [2] M. Feldhofer and C. Rechberger: in On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, LNCS, vol. 4277 (Springer, Berlin, Heidelberg, 2006) 372–381.
3. [3] X. Guo, et al.: “Silicon implementation of sha-3 finalists: BLAKE, Grøstl, JH, Keccak and Skein,” ECRYPT II Hash Workshop (2011).
4. [4] A. Shamir: in Fast Software Encryption, LNCS, vol. 5086 (Springer, Berlin, Heidelberg, 2008) 144–157.
5. [5] S. Badel, et al.: in Cryptographic Hardware and Embedded Systems, CHES, LNCS, vol. 6225 (Springer, Berlin, Heidelberg, 2010) 398–412.