1. Anderson , R. 1993 . The Classification of Hash Functions.Proceedings of the IMA Conference in Cryptography and Coding.
2. Bellare , M. and P. Rogaway . 1993 . Random Oracles are Practical: A Paradigm for Designing Efficient Protocols,ACM Proceedings of Conference on Computer and Communications Security(ACM, ed.), pp. 62–73 .
3. Bertoni , G. J. Daemen , M. Peeters , and G. Van Assche . August 2006 .RADIOGATÚN, A Belt-and-Mill Hash Function: Second Cryptographic Hash Workshop, Santa Barbara, http://radiogatun.noekeon.org/ .
4. Bertoni , G. J. Daemen , M. Peeters , and G. Van Assche . May 2007 .Sponge Functions, Ecrypt Hash Workshop, also available as public comment to NIST from http://www.csrc.nist.gov/pki/HashWorkshop/Public_Comments/2007_May.html .