1. R. Anderson, “The Classification of Hash Functions,” in Codes and Cuphers — Proceedings of Cryptography and Coding IV, (Essex, UK), pp. 83–93, Institute of Mathematics and its Applications (IMA), 1995.
2. S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, “Cryptographic Hash Functions: A Survey,” Tech. Rep. 95-09, Department of Computer Science, University of Wollongong, July 1995.
3. S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, “Practical and Secure Message Authentication,” in Series of Annual Workshop on Selected Areas in Cryptography (SAC '95), (Ottawa, Canada), pp. 55–68, May 1995.
4. T. A. Berson, L. Gong, and T. M. A. Lomas, “Secure, Keyed, and Collisionful Hash Functions,” Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. 1993. The revised version (September 2, 1994).
5. J. L. Carter and M. N. Wegman, “Universal Class of Hash Functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.