1. Albertini, A., Aumasson, J.P., Eichlseder, M., Mendel, F., Schläffer, M.: Malicious hashing: Eve’s variant of SHA-1. Cryptology ePrint Archive, Report 2014/694 (2014).
http://eprint.iacr.org/
2. Aranha, D.F., Fouque, P.A., Qian, C., Tibouchi, M., Zapalowicz, J.C.: Binary elligator squared. Cryptology ePrint Archive, Report 2014/486 (2014).
http://eprint.iacr.org/
3. Lecture Notes in Computer Science;M Backes,2005
4. Lecture Notes in Computer Science;M Bellare,2013
5. Lecture Notes in Computer Science;M Bellare,2014