1. Communications in Computer and Information Science;M Meziani,2011
2. Lecture Notes in Computer Science;IB Damgaard,1990
3. Augot, D., Finiasz, M., Sendrier, N.: A fast provably secure cryptographic hash function. IACR Cryptology ePrint Archive 2003:230 (2003)
4. Finiasz, M., Gaborit, P., Sendrier, N., Manuel, S.: Sha-3 proposal: Fsb. Proposal of a hash function for the NIST SHA-3 competition, October 2008
5. Merkle, R.C.: Secrecy, authentication, and public key systems. PhD thesis, Stanford University (1979)