References
- Eurocrypt'94 Optimal asymmetric encryption Mihir Bellare;Phillip Rogaway
- Data Encryption Standard;FIPS PUB 46 National Bureau of Standards
- In Request for Comments(RFC) 1321 The MD5 message digest algorithm Ronald L. Rivest
- Crypto'96 Keying hash functions for message authentication Mihir Belare;Ran Canetti;Hugo Krawczyk
- CryptoBytes v.1 no.1 Message Authentication with MD5 Burt Kaliski;Matt Robshaw
- Crypto'95 MDx-MAC and building fast MACs from hash functions Bart Preneel;Paul~C. van Oorschot
- Journal of Computer and System Science v.22 New hash functions and their use in authentication Mark N. Wegman;J.~Lawrence Carter
- Fast Software Encryption Workshop MMH : Software Message Authentication in the Gbit/second Rates Shai Halevi;Hugo Krawczyk
- Crypto'94 LFSR-based Hashging and Authentication Hugo Krawczyk;Yvo G. Desmedt(ed.)
- Crypto'95 Bucket hashing and its application to fast message authentication Phillip Rogaway
- Journal of Computer and System Sciences v.18 Universal classes of hash functions J. Lawrence Carter;Mark~N. Wegman