1. Tsudik, G.: Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review 22(5), 29–38 (1992)
2. U.S. Department of Commerce, National Institute of Standards and Technology: Federal Register 72(212) (November 2, 2007),
http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf
3. Lecture Notes in Computer Science;X. Wang,2009
4. Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. In: FOCS, pp. 514–523 (1996)
5. Dunkelman, O., Keller, N., Shamir, A.: ALRED blues: New attacks on AES-based MACs. Cryptology ePrint Archive, Report 2011/095 (2011),
http://eprint.iacr.org/2011/095