1. [1] Y. Sasaki and L. Wang, “Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5,” Selected Areas in Cryptography, ed. T. Lange, K.E. Lauter, and P. Lisonek, Lect. Notes Comput. Sci., vol.8282, pp.493-512, Springer-Verlag, Berlin, Heidelberg, New York, 2013.
2. [2] R.L. Rivest, Request for Comments 1321: The MD5 Message Digest Algorithm. The Internet Engineering Task Force, 1992. http://www.ietf.org/rfc/rfc1321.txt
3. [3] U.S. Department of Commerce, National Institute of Standards and Technology, Secure Hash Standard (SHS) (Federal Information Processing Standards Publication 180-3), 2008. http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf
4. [4] G. Tsudik, “Message authentication with one-way hash functions,” ACM SIGCOMM Computer Communication Review, vol.22, no.5, pp.29-38, 1992.
5. [5] B. Preneel and P.C. van Oorschot, “MDx-MAC and building fast MACs from hash functions,” Advances in Cryptology — CRYPTO 1995, ed. D. Coppersmith, Lect. Notes Comput. Sci., vol.963, pp.1-14, Springer-Verlag, Berlin, Heidelberg, New York, 1995.