1. Menzes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton, pp 425–488
2. Ms A (2007) Public key cryptography: applications algorithms and mathematical explanations. Tata Elxsi, India
3. Preneel B, Mercierlaan K (2004) Cryptanalysis of message authentication codes. Department Electrical Engineering, Katholieke Universiteit Leuven, Belgium
4. Damgard A (1989) Design principle for hash functions. In: Brassard G (ed) Advances in cryptology-crypto 89 proceedings. Lecture notes in computer science, vol 435. Springer-Verlag, Berlin
5. Yang F (2005) Cryptanalysis on an algorithm for efficient digital signatures. In: Cryptology ePrint archive 2005/456