1. Lect Notes Comput Sci;P. Camion,1986
2. Lect Notes Comput Sci;P. Camion,1988
3. M. Campana and M. Girault, How to Use Compressed Encoding Mechanisms in Data Protection, Securicom 88, March 15–17, pp. 91–110.
4. D. Dacunha-Castelle and D. Revuz, Recueil de problèmes de calcul des probabilités, Masson et Cie, Paris, 1970.
5. I. Damgård, Design Principles for Hash Functions, Proceedings of Crypto’89, Springer-Verlag.