1. Thomas A. Berson. Differential cryptanalysis mod 232 with applications to MD5. In Advances in Cryptology — Proceedings of EuroCrypt'92, Lecture Notes in Computer Science. Springer-Verlag, 1992. (to appear).
2. I. Damgård. Collision free hash functions and public key signature schemes. In Advances in Cryptology — Proceedings of EuroCrypt'87, Lecture Notes in Computer Science. Springer-Verlag, 1987.
3. I. Damgård. A design principle for hash functions. In G. Brassard, editor, Advances in Cryptology — Proceedings of Crypto'89, Lecture Notes in Computer Science, Vol. 435, pages 416–427. Springer-Verlag, 1990.
4. W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):472–492, 1976.
5. B. Kaliski. The MD2 message digest algorithm, April 1992. Request for Comments (RFC) 1319.