1. Lecture Notes in Computer Science;M Bellare,1996
2. Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions–the hmac construction. RSA Laboratories CryptoBytes 2(1), 12–15 (1996)
3. Lecture Notes in Computer Science;M Dürmuth,2012
4. Elenkov, N.: Android Security Internals. No Starch Press (2014)
5. Frederiksen, T.K.: Using cuda for exhaustive password recovery (2011).
http://daimi.au.dk/~jot2re/cuda/resources/report.pdf