1.
J. Daemen, Cipher and Hash Function Design, Strategies Based on Linear and Differential Cryptanalysis, PhD Thesis, K.U.Leuven, 1995. http://jda.noekeon.org/.
2. J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Information Security and Cryptography, Springer, 2002.
3.
D. L. G. Filho, P. S. Barreto and V. Rijmen, The Maelstrom-0 hash function, In Proceedings of the 6th Brazilian Symposium on Information and Computer Systems Security, 2006, 17-29.
4.
P. Gauravaram, L. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schläffer and S. Thomsen, Gr$\phi$stl - a SHA-3 candidate, Submission to NIST, 2008, Available at http://www.groestl.info/, 09 2008.
5. J. Guo, T. Peyrin and A. Poschmann, The PHOTON family of lightweight hash functions, In P. Rogaway, editor, Advances in Cryptology – CRYPTO 2011, Berlin, Heidelberg, Springer Berlin Heidelberg, 2011,222-239.