1. Lecture notes in computer science;IB Damgård,1990
2. Gibson JK (1990) Some comments on Damgård’s hashing principle. Electron Lett 26(15):1178–1179
3. Merkle R (1979) Secrecy, authentication, and public key systems. UMI Research Press, Ann Arbor
4. Preneel B (1993) Analysis and design of cryptographic hash functions. Doctoral Dissertation, Katholieke Universiteit Leuven
5. Lecture notes in computer science;B Preneel,1999