1. R. Atkinson, “Security Architecture for the Internet Protocol”, IETF Network Working Group, RFC 1825, August 1995.
2. R. Atkinson, “IP Authentication Header”, IETF Network Working Group, RFC 1826, August 1995.
3. M. Bellare, R. Canetti and H. Krawczyk, “Keying hash functions for message authentication,” (full version of the current paper) available at http://www-cse.ucsd.edu/users/mihir or http://www.research.ibm.com/security/keyed-md5.html .
4. M. Bellare, R. Canetti and H. Krawczyk, “Pseudorandom functions revisted: the cascade construction,” Available via http://www.research.ibm.com/security/ or http://www-cse.ucsd.edu/users/mihir/papers/papers.html .
5. Lect Notes Comput Sci;M. Bellare,1995