1. Black J, Rogaway P, Shrimpton T (2002) Blackbox analysis of the block-cipher-based hash-function constructions from PGV. In: Yung M (ed) Advances in cryptology, proceedings Crypto’02. LNCS, vol 2442. Springer, pp 320–355
2. Davies D, Price WL (1984) Digital signatures, an update. In: Proceedings 5th international conference on computer communication, October 1984, pp 845–849
3. Hirose S (2002) Secure block ciphers are not sufficient for one-way hash functions in the Preneel-Govaerts-Vandewalle model. In: Nyberg K, Heys HM (eds) Selected areas in cryptography. LNCS, vol 2595. Springer, pp 339–352
4. Knudsen LR, Rijmen V (2007) Known-key distinguishers for some block ciphers. In: Kurosawa K (ed) Advances in cryptology, proceedings Asiacrypt’07. LNCS, vol 4833. Springer, pp 315–324
5. Preneel B (1993) Analysis and design of cryptographic hash functions. Doctoral Dissertation, Katholieke Universiteit Leuven