1 |
M. Bona, "A Walk Through Combinatorics: An Introduction to Enumeration and Graph Theory," 3rd Edition, pp. 134-136, May 2006.
|
2 |
D. Hong and D. Kwon, "Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No. 8, pp. 1747-1753, August 2014.
DOI
|
3 |
L. R. Knudsen, F. Mendel, C. Rechberger and S. S. Thomsen, "Cryptanalysis of MDC-2," Eurocrypt 2009, LNCS 5479, pp. 106-120, April 2009.
|
4 |
J. Lee and M. Stam, "MJH: a faster alternative to MDC-2," Designs, Codes and Cryptography, Vol. 76. Issue 2. pp. 179-205, August 2015.
DOI
|