N. J. Alfardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J. C. Schuldt, On the security of RC4 in TLS, USENIX Security Symposium, pp.305-320, 2013.

T. Ashur and V. Rijmen, On linear hulls and trails, Progress in Cryptology-INDOCRYPT 2016, vol.10095, pp.269-286, 2016.

C. Committee, CAESAR: Competition for authenticated encryption: Security, applicability, and robustness. Call for submissions, 2013.

T. Duong and J. Rizzo, Here come the ? ninjas, 2011.

A. D. Dwivedi, M. Klou?ek, P. Morawiecki, I. Nikoli´cnikoli´c, J. Pieprzyk et al., SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition, Cryptology ePrint Archive, 1053.

A. D. Dwivedi, P. Morawiecki, and S. Wójtowicz, Differential and rotational cryptanalysis of round-reduced MORUS, E-Business and TelecommunicationsICETE/SECRYPT 2017, pp.275-284, 2017.

M. J. Dworkin, NIST SP 800-38D: Recommendation for block cipher modes of operation: Galois/Counter Mode (GCM) and GMAC. National Institute of Standards and Technology (NIST) Special Publication (SP), 2007.

D. Kales, M. Eichlseder, and F. Mendel, Note on the robustness of CAESAR candidates. IACR Cryptology ePrint Archive, 1137.

I. Mantin and A. Shamir, A practical attack on broadcast RC4, Fast Software Encryption-FSE 2001, vol.2355, pp.152-164, 2001.

M. Matsui, Linear cryptanalysis method for DES cipher, Advances in CryptologyEUROCRYPT 1993, vol.765, pp.386-397, 1993.

M. Matsui and A. Yamagishi, A new method for known plaintext attack of FEAL cipher, Advances in Cryptology-EUROCRYPT 1992, vol.658, pp.81-91, 1992.

D. A. Mcgrew and J. Viega, The security and performance of the Galois/Counter Mode (GCM) of operation, Progress in Cryptology-INDOCRYPT 2004, vol.3348, pp.343-355, 2004.

A. Mileva, V. Dimitrova, and V. Velichkov, Analysis of the authenticated cipher MORUS (v1), Cryptography and Information Security in the Balkans-BalkanCryptSec 2015, vol.9540, pp.45-59, 2015.

B. Minaud, Linear biases in AEGIS keystream, Selected Areas in Cryptography-SAC 2014, vol.8781, pp.290-305, 2014.

M. I. Salam, L. Simpson, H. Bartlett, E. Dawson, J. Pieprzyk et al., Investigating cube attacks on the authenticated encryption stream cipher MORUS, pp.961-966, 2017.

T. Shi, J. Guan, J. Li, and P. Zhang, Improved collision cryptanalysis of authenticated cipher morus, Artificial Intelligence and Industrial Engineering-AIIE, vol.133, pp.429-432, 2016.

S. Vaudenay and D. Vizár, Under pressure: Security of CAESAR candidates beyond their guarantees. Cryptology ePrint Archive, 1147.

H. Wu and T. Huang, Submission to CAESAR: Competition for Authenticated Encryption. Security, Applicability, and Robustness (Round 3 and Finalist), 2016.

H. Wu and B. Preneel, AEGIS: A fast authenticated encryption algorithm, Selected Areas in Cryptography-SAC 2013, vol.8282, pp.185-201, 2013.

H. Wu and B. Preneel, Submission to CAESAR: Competition for Authenticated Encryption. Security, Applicability, and Robustness (Round 3 and Finalist, 2016.