1. An, Y., Oh, S.: RFID System for User’s Privacy Protection. In: IEEE Asia-Pacific Conference on Communications, pp. 16–519. IEEE Computer Society, Los Alamitos (2005)
2. Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-based RFID Protocol. In: 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), pp. 110–114. IEEE Computer Society, Los Alamitos (2005)
3. Baretto, P., Rijmen, V.: The Whirlpool Hashing Function, http://paginas.terra.com.br/informatica/-paulobarreto/WhirlpoolPage.html
4. Biham, E., Dunkelman, O.: A Framework for Iterative Hash Functions - HAIFA. Presented at Second NIST Cryptographic Hash Workshop, August 24-25 (2006), csrc.nist.gov/groups/ST/hash/
5. Lecture Notes in Computer Science;J. Black,2002