1. Brassard, G.: On Computationally Secure Authentication Tags. Advances in Cryptology-CRYPTO’82, proceedings, Springer-Verlag (1983) 79–86
2. Carter, J. L., Wegman, M. N.: Universal Classes of Hash Functions. Journal of Computer and Systems Sciences 18 (1979) 143–154
3. Damgaard, I. B.: A Design Principle for Hash Functions. Advances in Cryptology-CRYPTO’89, proceedings, Springer-Verlag (1990) 416–427
4. ISO/IEC 9797: Data Cryptographic Techniques-Data Integrity Mechanism using a Cryptographic Check Function employing a Block Cipher Algorithm. International Organisation for Standardisation (1989)
5. Jueneman, R. R.: A High-Speed Manipulation Detection Code. Advances in Cryptology-CRYPTO’86, proceedings, Springer-Verlag (1987) 327–346