1. Lecture Notes in Computer Science;G Alpár,2013
2. Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. J. Cryptology 26(2), 313–339 (2013)
3. Bellare, M., Goldreich, O., Mityagin, A.: The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive, Report 2004/309 (2004).
http://eprint.iacr.org/2004/309/
4. Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362–399 (2000)
5. Braun, M., Hess, E., Meyer, B.: Using elliptic curves on RFID tags. IJCSNS Int. J. Comput. Sci. Netw. Secur. 8(2), 1–9 (2008)