1. S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, “Cryptographic Hash Functions: A Survey,” Tech. Rep. 95-09, Department of Computer Science, University of Wollongong, July 1995.
2. S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, “Password-Based Authenticated Key Exchange using Collisionful Hash Functions,” in the Astralian Conference on Information Security and Privacy, 1996. (To Appear).
3. T. A. Berson, L. Gong, and T. M. A. Lomas, “Secure, Keyed, and Collisionful Hash Functions,” Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. 1993. The revised version (September 2, 1994).
4. J. L. Carter and M. N. Wegman, “Universal Class of Hash Functions,” Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979.
5. I. B. Damgård, “A Design Principle for Hash Functions,” in Advances in Cryptology, Proceedings of CRYPTO '89, pp. 416–427, Oct. 1989.