1. Fomichev, V.M., Melnikov, D.A.: Cryptographic methods of information security, in 2 parts. Part 2. The textbook for undergraduate academic/Under the editorship of V. M. Fomichev/YURAYT, Moscow, (2016) (in Russian)
2. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons Inc, New York (1995)
3. Stigge, M., Plotz, H., Muller, W., Redlich, J.-P.: Reversing CRC - Theory and Practice // HU Berlin Public Report (2006)
4. Fomichev, V.M., Koreneva, A.M., Nabiev, T.R.: «On the new integrity checking algorithm», RusCrypto’20, (in Russian), https: //www.ruscrypto.ru/resource/archive/rc2020/files/02_koreneva_fomichev.pdf
5. Bobrovskiy, D.A., Zadorozhny, D.I., Koreneva, A.M., Nabiev, T.R., Fomichev, V.M. «On integrity checking of stored data using hashing», RusCrypto’21, (in Russian), https://www.ruscrypto.ru/resource/archive/rc2021/files/02_bobrovskiy_zadorozhniy_koreneva_nabiyev_fomichev.pdf