1. [1] A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, 5th ed, ISBN: 0-8493-8523-7, CRC Press, 1996.
2. [2] A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, and Y. Seurin, “Hash functions and RFID tags: Mind the gap,” LNCS, CHES, vol.5154, pp.283-299, 2008.
3. [3] E. Fleischmann, C. Forler, S. Lucks, and J. Wenzel, “Weimar-DM: A Highly Secure Double-Length Compression Function,” LNCS, ACISP, vol.7372, pp.152-165, 2012.
4. [4] S. Hirose, “Some Plausible Constructions of Double-Block-Length Hash Functions,” LNCS, FSE, vol.4047, pp.210-225, 2006.
5. [5] Y. Dodis, T. Ristenpart, and T. Shrimpton, “Salvaging Merkle-Damgard for Practical Applications,” LNCS, EUROCRYPT, vol.5479, pp.371-388, 2009.