1 |
B. Preneel, "Analysis and design of cryptographic hash functions," PhD dissertation, Katholieke Universiteit Leuven, Belgium, 1993.
|
2 |
N. Vijayarangan, "Method for designing a secure hash function and a system thereof," U.S. Patent 20090262925, Oct 22, 2009.
|
3 |
National Institute of Standards and Technology, "Cryptographic hash algorithm competition," http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.
|
4 |
Tata Consultancy Services, "TCS annual report 2011-2012," http://www.tcs.com/investors/Documents/Annual%20Reports/TCS_Annual_Report_2011-2012.pdf.
|
5 |
Tata Consultancy Services, "TCS recognized as Big Four IT Services brand," http://www.tcs.com/news_events/press_releases/Pages/TCS_recognized_Big_Four_IT_Services_brand.aspx.
|
6 |
Tata Consultancy Services, "TCS annual report 2007-2008," http://www.tcs.com/investors/Documents/Annual%20Reports/TCS_Annual_Report_2007_2008.PDF.
|
7 |
N. Vijayarangan, "A new hash algorithm: Khichidi-1," 2008; http://ehash.iaik.tugraz.at/uploads/d/d4/Khichidi-1.pdf.
|
8 |
N. Mouha, "Automated techniques for hash function and block cipher cryptanalysis," Ph.D. dissertation, Katholieke Universiteit Leuven, Belgium, 2012.
|
9 |
B. Preneel, "The state of cryptographic hash functions," in Lectures on Data Security. Heidelberg: Springer, 1999, pp. 158-182.
|
10 |
National Institute of Standards and Technology, "Khichidi-1 package," http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Khichidi-1.zip.
|