1. Black, J., Cochran, M., Highland, T.: A study of the MD5 attacks: Insights and improvements (full version). Manuscript available at, http://www.cs.colorado.edu/~jrblack/papers.html
2. Lecture Notes in Computer Science;I. Damgård,1990
3. Daum, M.: Cryptanalysis of hash functions of the MD4 family. Dissertation, available at, http://www.cits.rub.de/imperia/md/content/magnus/dissmd4.pdf
4. Lecture Notes in Computer Science;B. Boer den,1994
5. Dobbertin, H.: Cryptanalysis of MD5 compress. Presented at the rump session of EUROCRYPT 1996 (1996)