1. Abed F., Forler C., List E., Lucks S., Wenzel J.: Counter-bDM: a provably secure family of multi-block-length compression functions. In: Progress in Cryptology—AFRICACRYPT 2014. Lecture Notes in Computer Science, vol. 8469, pp. 440–458. Springer, Heidelberg (2014).
2. Andreeva E., Mennink B., Preneel B.: Security properties of domain extenders for cryptographic hash functions. J. Inf. Process. Syst. 6(4), 453–480 (2010).
3. Andreeva E., Mennink B., Preneel B.: Security reductions of the second round SHA-3 candidates. In: Information Security Conference—ISC 2010. Lecture Notes in Computer Science, vol. 6531, pp. 39–53. Springer, Heidelberg (2010).
4. Andreeva E., Mennink B., Preneel B.: The parazoa family: generalizing the sponge hash functions. Int. J. Inf. Secur. 11(3), 149–165 (2012).
5. Andreeva E., Mennink B., Preneel B., Škrobot M.: Security analysis and comparison of the SHA-3 Finalists BLAKE. In: Grøstl J.H., Keccak and Skein (eds.) Progress in Cryptology—AFRICACRYPT 2012. Lecture Notes in Computer Science, vol. 7374, pp. 287–305. Springer, Heidelberg (2012).