1. Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. IACR ePrint archive, http://eprint.iacr.org/2003/065/ Full version of this paper
2. Lecture Notes in Computer Science;I. Damgård,1990
3. Lecture Notes in Computer Science;H. Dobbertin,1996
4. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
5. Lecture Notes in Computer Science;R. Merkle,1990