1. Collisions for the compression function of MD5;Den Boer,1994
2. Cryptanalysis of MD5 compress;Dobbertin,1996
3. Mathematical cryptology for computer scientists and mathematicians;Patterson,1987
4. Applied cryptography, second edition protocols, algorithms and source code in C;Schneier,1996
5. Opinion: cryptanalysis of MD5 and SHA: time for a new standard;Schneier;Computerworld,2004