Charles André (2004):
Computing SyncCharts Reactions.
Electron. Notes Theor. Comput. Sci. 88,
pp. 3–19,
doi:10.1016/j.entcs.2003.05.007.
Gérard Berry (2007):
SCADE: Synchronous design and validation of embedded control software.
In: Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems.
Springer,
pp. 19–33,
doi:10.1109/5.97300.
Gérard Berry & Georges Gonthier (1992):
The Esterel Synchronous Programming Language: Design, Semantics, Implementation.
Sci. Comput. Program. 19,
pp. 87–152,
doi:10.1016/0167-6423(92)90005-V.
Jean-Louis Colaço, Bruno Pagano & Marc Pouzet (2017):
SCADE 6: A formal language for embedded critical software development (invited paper).
In: Frédéric Mallet, Min Zhang & Eric Madelaine: Proceedings of the 11th International Symposium on Theoretical Aspects of Software Engineering (TASE'17), Sophia Antipolis, France.
IEEE Computer Society,
pp. 1–11,
doi:10.1109/TASE.2017.8285623.
Donald W. Davies (1985):
A Message Authenticator Algorithm Suitable for a Mainframe Computer.
In: G. R. Blakley & David Chaum: Advances in Cryptology – Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (CRYPTO'84), Santa Barbara, CA, USA,
Lecture Notes in Computer Science 196.
Springer,
pp. 393–400,
doi:10.1007/3-540-39568-7_ 30.
Donald W. Davies & David O. Clayden (1988):
The Message Authenticator Algorithm (MAA) and its Implementation.
NPL Report DITC 109/88.
National Physical Laboratory,
Teddington, Middlesex, UK.
Hubert Garavel & Lina Marsso (2017):
A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm.
In: Holger Hermanns & Peter Höfner: Proceedings of the 2nd Workshop on Models for Formal Analysis of Real Systems (MARS'17), Uppsala, Sweden,
Electronic Proceedings in Theoretical Computer Science 244,
pp. 129–183,
doi:10.4204/EPTCS.244.6.
Hubert Garavel & Lina Marsso (2018):
Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm.
In: Holger Hermanns & Peter Höfner: Proceedings of the 3nd Workshop on Models for Formal Analysis of Real Systems (MARS'18), Thessaloniki, Greece 268,
pp. 41–87,
doi:10.4204/EPTCS.268.2.
Nicolas Halbwachs, Paul Caspi, Pascal Raymond & Daniel Pilaud (1991):
The synchronous dataflow programming language Lustre.
Proceedings of the IEEE 79(9),
pp. 1305–1320,
doi:10.1109/5.97300.
ISO (1986):
Requirements for Message Authentication (Wholesale).
International Standard 8730.
International Organization for Standardization – Banking,
Geneva.
ISO (1987):
Approved Algorithms for Message Authentication – Part 1: Data Encryption Algorithm (DEA).
International Standard 8731-1.
International Organization for Standardization – Banking,
Geneva.
ISO (1990):
Requirements for Message Authentication (Wholesale).
International Standard 8730.
International Organization for Standardization – Banking,
Geneva.
ISO (1992):
Approved Algorithms for Message Authentication – Part 2: Message Authenticator Algorithm.
International Standard 8731-2.
International Organization for Standardization – Banking,
Geneva.
Erwan Jahier, Pascal Raymond & Philippe Baufreton (2006):
Case studies with Lurette V2.
International Journal on Software Tools for Technology Transfer 8(6),
pp. 517–530,
doi:10.1007/s10009-006-0023-9.
M. K. F. Lai (1991):
A Formal Interpretation of the MAA Standard in Z.
NPL Report DITC 184/91.
National Physical Laboratory,
Teddington, Middlesex, UK.
Alfred Menezes, Paul C. van Oorschot & Scott A. Vanstone (1996):
Handbook of Applied Cryptography.
CRC Press.
Available from http://cacr.uwaterloo.ca/hac.
Harold B. Munster (1991):
Comments on the LOTOS Standard.
NPL Technical Memorandum DITC 52/91.
National Physical Laboratory,
Teddington, Middlesex, UK.
Harold B. Munster (1991):
LOTOS Specification of the MAA Standard, with an Evaluation of LOTOS.
NPL Report DITC 191/91.
National Physical Laboratory,
Teddington, Middlesex, UK.
Available at ftp://ftp. inrialpes.fr/pub/vasy/publications/others/Munster-91-a.pdf.
Graeme I. Parkin & G. O'Neill (1990):
Specification of the MAA Standard in VDM.
NPL Report DITC 160/90.
National Physical Laboratory,
Teddington, Middlesex, UK.
Graeme I. Parkin & G. O'Neill (1991):
Specification of the MAA Standard in VDM.
In: Søren Prehn & W. J. Toetenel: Formal Software Development – Proceedings (Volume 1) of the 4th International Symposium of VDM Europe (VDM'91), Noordwijkerhout, The Netherlands,
Lecture Notes in Computer Science 551.
Springer,
pp. 526–544,
doi:10.1007/3-540-54834-3_ 31.
Bart Preneel (2011):
MAA.
In: Henk C. A. van Tilborg & Sushil Jajodia: Encyclopedia of Cryptography and Security (2nd Edition).
Springer,
pp. 741–742,
doi:10.1007/978-1-4419-5906-5_ 591.
Bart Preneel & Paul C. van Oorschot (1996):
On the Security of Two MAC Algorithms.
In: Ueli M. Maurer: Advances in Cryptology – Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'96), Saragossa, Spain,
Lecture Notes in Computer Science 1070.
Springer,
pp. 19–32,
doi:10.1007/3-540-68339-9_ 3.
Bart Preneel & Paul C. van Oorschot (1999):
On the Security of Iterated Message Authentication Codes.
IEEE Transactions on Information Theory 45(1),
pp. 188–199,
doi:10.1109/18.746787.
Bart Preneel, Vincent Rumen & Paul C. van Oorschot (1997):
Security Analysis of the Message Authenticator Algorithm (MAA).
European Transactions on Telecommunications 8(5),
pp. 455–470,
doi:10.1002/ett.4460080504.
Pascal Raymond, Yvan Roux & Erwan Jahier (2008):
Lutin: a language for specifying and executing reactive scenarios.
EURASIP Journal on Embedded Systems 2008,
doi:10.1109/MS.2013.43.
Vincent Rijmen, Bart Preneel & Erik De Win (1996):
Key Recovery and Collision Clusters for MAA.
In: Proceedings of the 1st International Conference on Security in Communication Networks (SCN'96).