1. The rebound attack: cryptanalysis of reduced whirlpool and Grøstl;Mendel,2009
2. A simple secure hash function scheme using multiple chaotic maps;Ahmad;3D Res,2017
3. Hash functions based on block ciphers: a synthetic approach;Preneel,1993
4. Announcing the first SHA1 collision;Stevens;Google Secur Blog,2017
5. Sha-3 standard: permutation-based hash and extendable-output functions;Dworkin,2015