1. M. Bellare, R. Canetti, and H. Krawcyk, “Keying MD5 — Message Authentication via Iterated Pseudorandomness,” manuscript.
2. M. Bellare, J. Kilian, and P. Rogaway, “The Security of Cipher Block Chaining,” Advances in Cryptology-Crypto’ 94, Springer Verlag (1994).
3. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag (1993).
4. E. Biham and A. Shamir, “Differential Cryptanalysis of Snefru, Khafre, REDOC II, LOKI, Lucifer,” Advances in Cryptology Crypto’ 91, Springer Verlag (1992).
5. E. Biham and A. Shamir, “Differential Cryptanalysis of Feal and N-hash”, Advances in Cryptology Eurocrypt’ 91, Springer Verlag (1991).