1. NIST Approved Algorithms for Secure Hashing,
http://csrc.nist.gov/groups/ST/toolkit/secure_hashing.html
2. Halevi, S.: Cryptographic Hash Functions and their many applications. In: USENIX Security Symposium (2009),
http://people.csail.mit.edu/shaih/pubs/Cryptographic-Hash-Functions.ppt
3. Von Neumann, J.: Various Techniques used in Connection with Random Digits. National Bureau of Standards Applied Mathematics Series 12, 36–38 (1951)
4. Lecture Notes in Computer Science;M. Dichtl,2007
5. Lecture Notes in Computer Science;M. Matsui,1994