1. Handbook of applied cryptography;Menezes,1996
2. Anderson R. The classification of hash functions 1993. Citeseer, doi:10.1.1.48.1096&rep=rep1&type=pdf,
3. Hashing in computer science: fifty years of slicing and dicing;Konheim,2010
4. Network security essentials;Stallings,2000
5. Cryptographic hash functions;Preneel;Eur Trans Telecomm,1994