References
- R. Anderson, 'The classification of hash functions', P. G. Farrell, editor, Codes and Cyphers: Cryptography and Coding IV, Institute of Mathematics & Its Applications, pp. 83-93, 1995
- I. B. Damgard, 'Collision free hash functions and public key signature schemes', Advances in Cryptology-EUROCRYPT'87, LNCS, vol. 304, pp. 203-216, 1988
- B. Preneel, 'Cryptographic hash functions', European Transactions on Telecommunications, vol. 5, pp. 431-448, 1994 https://doi.org/10.1002/ett.4460050406
- R. C. Merkle, 'One way hash functions and DES', Advances in Cryptology-CRYPTO'89, LNCS, Vol. 435, pp. 428-446, 1990
- H. Dobbertin, 'Cryptanalysis of MD-4', D. Gollmann, editor, Fast Software Encryption, Third International Workshop, LNCS, vol. 1039, pp. 71-82, Springer-Verlag, 1996
- M. J. Bach, 'The design of the UNIX operating system', ISBN 0-13-201799-7 or ISBN 0-13201757-1 (international ed.). Prentice-Hall 1986.
- J. J. Bae and T. Suda, 'Survey of Traffic Control Schemes and Protocols in ATM Networks', IEEE vol. 79, no. 2. February 1991 https://doi.org/10.1109/5.64405
- Colella, Callon, Gardner & Rekhter, 'Guidelines for OSI NSAP Allocation in the Internet', RFC 1629, IETF May 1994
- ATM Forum, 'LAN Emulation Over ATM Version 1.0', af-lane-0021.000, January 1995
- ATM Forum, 'ATM User Network Interface (UNI) Specification Version 3.1', ISBN 0-13393828-X, Prentice Hall, Englewood Cliffs, NJ, June 1995
- M. W. Garrett, 'A Service Architecture for ATM: From Applications to Scheduling', IEEE Network May/June 1996 https://doi.org/10.1109/65.494557
- G. C. Sacket and C. Y. Metz, 'ATM and Multiprotocol Networking', ISBN 0-07-057724-2, McGraw-Hill 1997