1. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography (CRC Press, Boca Raton, 1996).
2. B. Preneel, “Analysis and Design of Cryptographic Hash Functions,” Ph.D. thesis, Katholieke Universiteit Leuven, 2003.
3. B. Preneel, “Hash Function”, in Encyclopedia of Cryptography and Security, edited by H. C. A. van Tilborg, and S. Jajodia (Springer, New York, 2011), pp. 543–553.
4. B. Preneel, R. Govaerts, and J. Vandewalle, “Hash Functions Based on Block Cipher: a Synthetic Approach,” in Advanced in Cryptology, Lecture Notes in Computer Science 773, edited by D. Stinson (Springer-Verlag, Berlin, 1993), pp. 369–379.
5. B. van Rompay, “Analysis and Design of Cryptographic Hash Function, MAC Algorithms and Block Ciphers,” Ph.D. thesis, Katholieke Universiteit Leuven, 2004.