1. Zheng, X. and Jin, J. 2012. Research for the application and safety of MD5 algorithm in password authentication. InProceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, IEEE, Sichuan, China, 2216--2219.
2. Rubayya, R.S., Resmi, R. 2014. Memory optimization of HMAC /SHA-2 encryption. InProceedings of the 2014 First International Conference on Computational Systems and Communications (ICCSC), IEEE, Trivandrum, India, 282--287.
3. Idris, S., Zorkta, H., Khawatmi, S., and Aiyash, W. 2009. Enhanced HMAC based upon 3-D rossler system. InProceedings of the 2009 International Conference on Future Computer and Communication, IEEE, Kuala Lumpar, Malaysia, 465--369.
4. Naqvi, S.I. and Akram, A. 2011. Pseudo-random key generation for secure HMAC-MD5. InProceedings of the 2011 IEEE 3rdInternational Conference on Communication Software and Networks, IEEE, Xi'an, China, 573--577.
5. Wang, M. J., and Li, Y. Z. 2015, Hash function with variable output length. InProceedings of the 2015 International Conference on Network and Information system for Computers,IEEE, Wuhan, China, 190--193.