1. RSA Laboratories: PKCS #1 v2.1: RSA Cryptography Standard, RSA Data Security, Inc. (2002).
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf
2. Morris, R., Thompson, K.: Password security-a case history. Commun. ACM 22(11), 594–597 (1979)
3. Hawkes, P., Paddon, M., Rose, G.: The Mundja streaming MAC. Presented at the ECRYPT Network of Excellence in Cryptology workshop on the State of the Art of Stream Ciphers, October 2004, Brugge, Belgium (2004).
http://eprint.iacr.org/2004/271.pdf
. Accessed 19 June 2018
4. Chum, C., Jun, C., Zhang, X.: Implementation of randomize then-combine constructed hash function. In: Proceedings of 23rd Wireless Optical Communication Conference, IEEE Communication Society. Newark, New Jersey, May 9–10 (2014)
5. Haitner, I., Holenstein, T., Reingold, O., Vadhan, S., Wee, H.: Universal one-way hash functions via inaccessible entropy. In: Gilbert H. (eds.) Advances in Cryptology—EUROCRYPT 2010. EUROCRYPT 2010. Lecture Notes in Computer Science, vol 6110, pp. 616–637. Springer, Berlin, Heidelberg (2010)