1. Applied cryptography;Schneier,1996
2. Bakhtiari S, Safavi-Naini R, Pieprzyk J. Cryptographic hash functions: a survey. Technical report 95-09, Department of Computer Science, University of Wollongong; 1995.
3. Handbook of applied cryptography;Menezes,1997
4. Hong D, Chang D, Sung J, Lee S, Hong S, Lee J, et al. NewFORK-256. Cryptology ePrint Archive, report 2007/185; 2007.
5. Hong D, Chang D, Sung J, Lee S, Hong S, Lee J, et al. A new dedicated 256-bit hash function: FORK-256. In: FSE’06, LNCS, vol. 4047; 2006. p. 195–209.