1. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security 1993, pp. 62–73 (1993)
2. Bellare, M., Yee, B.: Forward-security in private-key cryptography, Cryptology ePrint Archive, Report 2001/035 (2001),
http://eprint.iacr.org/
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: Ecrypt Hash Workshop 2007 (May 2007), also available as public comment to NIST,
http://www.csrc.nist.gov/pki/HashWorkshop/Public_Comments/2007_May.html
4. Lecture Notes in Computer Science;G. Bertoni,2008
5. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponges (2009),
http://sponge.noekeon.org/