[1]
Huang, T. and Wu, H. 2018. Distinguishing Attack on NORX Permutation. IACR Transactions on Symmetric Cryptology. 2018, 1 (Mar. 2018), 57–73. DOI:https://doi.org/10.13154/tosc.v2018.i1.57-73.