1. Security aspects of piecewise hashing in computer forensics;Baier,2011
2. Keccak specifications;Bertoni,2009
3. mvhash-b – a new approach for similarity preserving hashing;Breitinger,2013
4. A fuzzy hashing approach based on random sequences and hamming distance;Breitinger,2012
5. Performance issues about context-triggered piecewise hashing;Breitinger,2012