1. Brachtl BO, Coppersmith D, Hyden MM, Matyas SM, Meyer CH, Oseas J, Pilpel S, Schilling M (1990) Data authentication using modification detection codes based on a public one way encryption function. US patent 4,908,861, 13 Mar 1990
2. Hong D, Kwon D (2014) Cryptanalysis of double-block-length jash modes MDC-4 and MJH. IEICE Trans Fundam Electron Commun Comput Sci 97-A(8):1747–1753
3. ISO/IEC 10118 Information technology – Security techniques – Hash-functions. (1998) Part 1: general, 2000, Part 2: hash-functions using an n-bit block cipher algorithm, 2000, Part 3: dedicated hash-functions, 2003. Part 4: hash-functions using modular arithmetic
4. Knudsen L, Preneel B (2002) Enhancing the security of hash functions using non-binary error correcting codes. IEEE Trans Inf Theory 48(9):2524–2539
5. Knudsen LR, Mendel F, Rechberger C, Thomsen SS (2009) Cryptanalysis of MDC-2. In: Joux A (ed) Advances in cryptology – EUROCRYPT’09: proceedings, Cologne, 26–30 April 2009. Lecture notes in computer science, vol 5479. Springer, Berlin, pp 106–120