1. Andreeva, E., et al.: New second-preimage attacks on hash functions. J. Cryptol. 29(4), 657–696 (2016). https://doi.org/10.1007/s00145-015-9206-4
2. Barnes, R., Beurdouche, B., Millican, J., Omara, E., Cohn-Gordon, K., Robert, R.: The Messaging Layer Security (MLS) Protocol, October 2020. https://tools.ietf.org/html/draft-ietf-mls-protocol-10
3. Lecture Notes in Computer Science;M Bellare,2000
4. Cisco Systems: SFrame (2020). https://github.com/cisco/sframe
5. Cisco Systems: Zero-Trust Security for Webex White Paper (2021). https://www.cisco.com/c/en/us/solutions/collateral/collaboration/white-paper-c11-744553.pdf