1. Lecture Notes in Computer Science;E. Andreeva,2010
2. Andreeva, E., Mennink, B., Preneel, B.: Security reductions of the second round SHA-3 candidates. Full version of this paper. Cryptology ePrint Archive, Report 2010/381 (2010)
3. Lecture Notes in Computer Science;E. Andreeva,2007
4. Aumasson, J.P., Henzen, L., Meier, W., Phan, R.: SHA-3 proposal BLAKE (2009)
5. Bellare, M., Kohno, T., Lucks, S., Ferguson, N., Schneier, B., Whiting, D., Callas, J., Walker, J.: Provable security support for the skein hash family (2009)