1. Damgard, I. (1989). A design principle for hash functions. In The Proceddings of CRYPTO’89, LNCS (Vol. 435, pp. 416–427).
2. Wang, X., et al. (2005). Cryptanalysis of the Hash Functions MD4 and RIPEMD. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Heidelberg: Springer, 2005.
3. Stevens, M. M. J. (2012). Attacks on hash functions and applications. Mathematical Institute, Faculty of Science, Leiden University, 2012.
4. Sasaki, Y., & Kazumaro, A. (2009). Finding preimages in full MD5 faster than exhaustive search. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Heidelberg: Springer, 2009.
5. Geethavani, B., Prasad, E. V., & Roopa, R. (2013). A new approach for secure data transfer in audio signals using DWT. In 2013 15th IEEE International Conference on Advanced Computing Technologies (ICACT) (pp. 1–6), September 2013.