References
- Bini , D. , Del Corso , G. M. , Manzini , G. and Margara , L. 2000 . Inversion of circulant matrices over Zm . Math. Comput. , 70 ( 235 ) : 1169 – 1182 .
- Borghoff , J. , Knudsen , L. R. , Leander , G. and Matusiewicz , K. Cryptanalysis of C2 . Proceedings CRYPTO’09 . Edited by: Halevi , S. Vol. 5671 , pp. 250 – 266 . Berlin : Springer . Lecture Notes in Computer Science
- Boyack , S. W. 1985 . “ The robustness of combinatorial measures of Boolean matrix complexity ” . MIT Mathematics Department . PhD thesis
- Contini , S. , Rivest , R. L. , Robshaw , M. J.B. and Yin , Y. L. Improved analysis of some simplified variants of RC6 . Proceedings of the Fast Software Encryption ’99 . Edited by: Knudsen , L. Vol. 1636 , pp. 1 – 15 . Berlin : Springer . Lecture Notes in Computer Science
- Guan , P. H. and He , Y. 1986 . Exact results for deterministic cellular automata with additive rules . J. Stat. Phys. , 14 ( 3/4 ) : 463 – 478 .
- Lidl , R. and Niederreiter , H. 1983 . Finite Fields , Vol. 20 , Cambridge : Cambridge University Press . Encyclopedia of Mathematics and Its Applications
- Marsaglia , G. 2003 . Xorshift RNGs . J. Stat. Soft. , 8 ( 14 ) : 1 – 6 . Avilable at http://www.jstatsoft.org/v08/i14/xorshift.pdf
- National Institute of Standards and Technology, Secure hash standard, FIPS 180-2, 1 August 2002
- Panneton , F. and L'Ecuyer , P. 2005 . On the Xorshift random number generators . ACM Trans. Model. Comp. Simul. , 15 ( 4 ) : 346 – 361 .
- R.L. Rivest, B. Agre, D.V. Bailey, C. Crutchfield, Y. Dodis, K.E. Fleming, A. Khan, J. Krishnamurthy, Y. Lin, L. Reyzin, E. Shen, J. Sukha, D. Sutherland, E. Tromer, and Y.L. Yin, The MD6 hash function: A proposal to NIST for SHA-3, September 2008. Available at http://groups.csail.mit.edu/cis/md6/
- Schnorr , C. P. and Vaudenay , S. Black box cryptanalysis of hash networks based on multipermutations . Proceedings EUROCRYPT ’94 . Edited by: De Santis , A. Vol. 950 , pp. 47 – 57 . Berlin : Springer . Lecture Notes in Computer Science
- S.S. Thomsen, Cryptographic hash functions, PhD thesis, Technical University of Denmark, 28 November 2008