R. Anderson, E. Biham, and L. Knudsen, Serpent: A Proposal for the Advanced Encryption Standard, Proceedings of the First AES Candidate Conference. National Institute of Standard and Technology, 1998.

E. Biham, R. Anderson, and L. Knudsen, Serpent: A New Block Cipher Proposal, Fast Software Encryption, pp.222-238, 1998.
DOI : 10.1007/3-540-69710-1_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Crenne, P. Cotret, G. Gogniat, R. Tessier, and J. P. Diguet, Efficient key-dependent message authentication in reconfigurable hardware, 2011 International Conference on Field-Programmable Technology, pp.1-6, 2011.
DOI : 10.1109/FPT.2011.6132722

URL : https://hal.archives-ouvertes.fr/hal-00671191

M. Dworkin, Recommendations for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, Tech. rep., NIST, 2004.
DOI : 10.6028/NIST.SP.800-38c

M. Dworkin, Recommendations for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Tech. rep., NIST, 2007.

L. Henzen and W. Fichtner, FPGA parallel-pipelined AES-GCM core for 100G Ethernet applications, 2010 Proceedings of ESSCIRC, pp.202-205, 2010.
DOI : 10.1109/ESSCIRC.2010.5619894

C. Jutla, Encryption Modes with Almost Free Message Integrity, Advances in Cryptology ? EUROCRYPT 2001, pp.529-544, 2001.
DOI : 10.1007/3-540-44987-6_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Krovetz and P. Rogaway, The Software Performance of Authenticated-Encryption Modes, Fast Software Encryption, pp.306-327, 2011.
DOI : 10.1006/ffta.2001.0339

D. A. Mcgrew and J. Viega, The Galois/Counter Mode of Operation (GCM). NIST Modes Operation Symmetric Key Block Ciphers, 2005.

M. Muehlberghuber, C. Keller, N. Felber, and C. Pendl, 100 Gbit/s Authenticated Encryption Based on Quantum Key Distribution, 2012 IEEE/IFIP 20th International Conference on VLSI and System-on-Chip, pp.123-128, 2012.

P. Rogaway, Online; accessed 05, 2013.

P. Rogaway, M. Bellare, J. Black, and T. Krovetz, OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption, ACM Conference on Computer and Communications Security, pp.196-205, 2001.

J. Viega and D. Mcgrew, The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP), RFC, vol.4106, 2005.
DOI : 10.17487/rfc4106

J. Wang, G. Shou, Y. Hu, and Z. Guo, High-speed architectures for GHASH based on efficient bit-parallel multipliers, Wireless Communications, Networking and Information Security (WCNIS) IEEE International Conference on, pp.582-586, 2010.

D. Whiting, R. Housley, and N. Ferguson, Counter with CBC-MAC (CCM), RFC, vol.3610, 2003.
DOI : 10.17487/rfc3610

G. Zhou, H. Michalik, and L. Hinsenkamp, Improving Throughput of AES-GCM with Pipelined Karatsuba Multipliers on FPGAs, Reconfigurable Computing: Architectures, Tools and Applications, pp.193-203, 2009.
DOI : 10.1007/978-3-540-75496-1_8

A. .. Ap and |. , Associated data block length q, Cipher key K Output: HashK (A) 1: {A1