1. Aho A, Sloane N (1970) Some doubly exponential sequences. Fibonacci Q 11:429–437
2. Andreeva E, Dunkelman O, Bouillaguet C, Kelsey J (2009) Herding, second preimage and Trojan message attacks beyond Merkle-Damgard. In: Lecture notes in computer science, vol 5867, pp 393–414
3. Czeizler E, Holub Š, Karhumäki J, Laine M (2007) Intricacies of simple word equations: an example. Int J Found Comput Sci 18(6):1167–1175
4. DeLuca A, Varrichio S (1999) Finiteness and regularity in semigroups and formal languages. Springer, Berlin
5. Halunen K, Kortelainen J, Kortelainen T (2010) Multicollision attacks on generalized iterated hash functions. In: Proceedings of the eight Australasian information security conference, AISC2010, Brisbane, Australia, January 2010, pp 85–93. Archived in Aust Comput Sci Commun 32(4) (2009)