1. Lecture Notes in Computer Science;M. Bellare,1996
2. National Institute of Standards and Technology, The Keyed-Hash Message Authentication Code (HMAC), Federal Information Processing Standards Publication HMAC (2001)
3. Deepakumara, J., Heys, H.M., Venkatesan, R.: Fpga implementation of md5 hash algorithm. In: Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 919–924. IEEE (2001)
4. Docherty, J., Koelmans, A.: A flexible hardware implementation of sha-1 and sha-2 hash functions. In: International Symposium on Circuits and Systems (ISCAS), pp. 1932–1935. IEEE (2011)
5. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer