1. Lecture Notes in Computer Science;C. Cannière de,2006
2. Daum, M., Lucks, S.: Attacking Hash Functions by Poisoned Messages, ”The Story of Alice and her Boss” (June 2005), http://www.cits.rub.de/MD5Collisions/
3. Gauravaram, P., McCullagh, A., Dawson, E.: Collision Attacks on MD5 and SHA-1: Is this the “Sword of Damocles” for Electronic Commerce? AusSCERT 2006 R&D Stream (May 2006), http://www.isi.qut.edu.au/people/subramap/AusCert-6.pdf
4. Gebhardt, M., Illies, G., Schindler, W.: A Note on Practical Value of Single Hash Collisions for Special File Formats. In: NIST First Cryptographic Hash Workshop (October/November 2005), csrc.nist.gov/pki/HashWorkshop/2005/Oct31%5FPresentations/Illies%5FNIST%5F05.pdf
5. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280 (April 2002), http://www.ietf.org/rfc/rfc3280.txt