Andreeva, E.
, Bouillaguet, C.
, Dunkelman, O.
and Kelsey, J.
(2009),
Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgaard, Selected Areas in Cryptography (Lecture Notes in Computer Science), Calgary, CA, [online], https://doi.org/10.1007/978-3-642-05445-7_25, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=903353
(Accessed January 2, 2025)