1. Lecture Notes in Computer Science;E. Andreeva,2011
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document (2009),
http://keccak.noekeon.org/Keccak-main-2.1.pdf
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission,
http://keccak.noekeon.org/Keccak-submission-3.pdf
4. Caballero-Gil, P., Hernandez-Goya, C.: Zero-knowledge hierarchical authentication in MANETs. IEICE Transactions on Information and Systems E89D(3), 1288–1289 (2006)
5. Chang, S., Perlner, R., Burr, W., Turan, M., Kelsey, J., Paul, S., Bassham, L.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NIST (2012),
http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7896.pdf