1 |
Douglas R. Stinson, Cryptography Theory and Practice, CRC, 1995
|
2 |
Warwick Ford, Computer Communications Security, Prentice-Hall International Inc, 1994
|
3 |
Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc. 1996
|
4 |
J. Touch, 'Report on MD5 performance' RFC 1810, June 1995
|
5 |
TTAS.KO-12.0011/R1 (2000): Hash function Algorithm Standard (HAS-160)
|
6 |
Man Young Rhee, Cryptography and Secure Communications, McGraw-Hill, 1994
|
7 |
Janaka Deepakumara, Howard M. Heys and R. Venkatesan, 'FPGA IMPLEMENTATION OF MD5 HASH ALGORITHM' Technical Paper, Engineering and Applied Science Memorial University of Newfoundland St. John Canada, 2001
|