1. Lecture Notes in Computer Science;J.-P. Aumasson,2008
2. Biham, E., Dunkelman, O.: A framework for iterative hash functions – HAIFA. IACR ePrint Archive, Report 2007/278 (2007), http://eprint.iacr.org/2007/278.pdf
3. Biham, E., Dunkelman, O., Bouillaguet, C., Fouque, P.-A.: Re-visiting HAIFA and why you should visit too. In: ECRYPT workshop Hash functions in cryptology: theory and practice (June 2008), http://www.lorentzcenter.nl/lc/web/2008/309/presentations/Dunkelman.pdf (accessed on 11/23/2008)
4. Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system I: The user language. Journal of Symbolic Computation 24(3-4), 235–265 (1997), http://magma.maths.usyd.edu.au/
5. Lecture Notes in Computer Science;I.B. Damgård,1989