1. Lecture Notes in Computer Science;E. Biham,2005
2. Lecture Notes in Computer Science;F. Chabaud,1998
3. De Cannière, C., Mendel, F., Pramstaller,N., Rechberger, C., Rijmen, V.: SHA Evaluation Report for CRYPTREC, January 21 (2006)
4. Lecture Notes in Computer Science;H. Gilbert,2003
5. Hawkes, P., Paddon, M., Rose, G.G.: On corrective patterns for the SHA-2 family. Cryptology ePrint Archive, Report /207 (August 2004),
http://eprint.iacr.org/