GCM IV reuse attack
Bitstream Protection in Dynamic Partial Reconfiguration Systems Using Authenticated Encryption (IEICE Trans on Info and Sys. 2013)
paper
Sec 4.2: good diagram to describe GCM.
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS (WOOT 2016)
Paper and slides
(Github) Attack demo code for WOOT 16
https://github.com/nonce-disrespect/nonce-disrespect/