1. Chen, L. (2008). Recommendation for key derivation using pseudorandom functions. NIST Special Publication, 800, 108.
2. Abdalla, M., & Bellare, M. (2000). Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques. Advances in Cryptology ASIACRYPT, 2000, 546–559.
3. Adams, C., Kramer, G., Mister, S., & Zuccherato, R. (2004). On the security of key derivation functions. In K. Zhang & Y. Zheng (Eds.), Information security (pp. 134–145). Palo Alto, CA: Springer.
4. Swenson, C. (2012). Modern cryptanalysis: Techniques for advanced code breaking. Hoboken: Wiley.
5. Retail financial services symmetric key management part 1: Using symmetric techniques. American National Standards Institute ANSI X9.24-1:2009 (2009).
https://tools.ietf.org/html/rfc5869
.