Secrecy, Authentication, and Public Key Systems, by Ralph C. Merkle, Ph.D. thesis, Stanford University, 1979.
A Certified Digital Signature: that antique paper from 1979, Advances in Cryptology—Crypto '89, Lecture Notes on Computer Science, Vol. 435, Springer-Verlag, Berlin, pages 218–238.
Universal one-way hash functions and their cryptographic applications, by Moni Naor and Moti Yung, Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15–17,1989, pages 33–43.
A high speed manipulation detection code, by Robert R. Jueneman, Advances in Crytopology—Crypto '86, Lecture Notes on Computer Science, Vol. 263, Berlin, pages 327–346.
Another birthday attack, by Don Coppersmith. Advances in Cryptology—Crypto '85, Lecture Notes on Computer Science, Vol. 218, Springer-Verlag, Berlin, pages 14–17.
A digital signature based on a conventional encryption function, by Ralph C. Merkle, Advances in Cryptology—Crypto '87, Lecture Notes on Computer Science, Vol. 293, Springer-Verlag, Berlin, pages 369–378.
Cryptography and Data Security
, by Dorothy E. R. Denning, Addison-Welsey, Reading, MA, 1982, page 170.Google Scholar
On the security of multiple encryption, by Ralph C. Merkle, Communication of the Association for Computing Machinery, Vol. 24, No. 7, July 1981, pages 465–467.
Results of an initial attempt to cryptanalze the NBS Data Encryption Standard, by Martin Hellman et al., Information System Lab. Report SEL 76–042, Stanford University, 1976.
Communication theory of secrecy systems, by C. E. Shannon, Bell Systems Technical Journal
, Vol. 28, Oct. 1949, pages 656–715.Google Scholar
Message authentication, by R. R. Jueneman, S. M. Matyas, and C. H. Meyer, IEEE Communications Magazine
, Vol. 23, No. 9, September 1985, pages 29–40.Google Scholar
Generating strong one-way functions with cryptographic algorithm, by S. M. Matyas, C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin
, Vol. 27, No. 10A, March 1985, pages 5658–5659Google Scholar
Analysis of Jueneman's MDC Scheme, by Don Coppersmith, preliminary version, June 9, 1988. Analysis of the system presented in  A high speed manipulation detection code, by Robert R. Jueneman, Advances in Crytopology—Crypto '86, Lecture Notes on Computer Science, Vol. 263, Berlin, pages 327–346.
The Data Encryption Standard: past and future, by M. E. Smid and D. K. Branstad, Proceedings of the IEEE
, Vol. 76, No. 5, May 1988, pages 550–559.Google Scholar
Defending Secrets, Sharing Data: New Locks and Keys for Electric Information, U.S. Congress, Office of Technology Assessment, OTA-CIT-310, U.S. Government Printing Office, Washington, October 1987
Exhaustive cryptanalysis of the NBS data encryption standard, by Whitfield Diffie and Martin Hellman, Computer, June 1977, pages 74–78.
Cryptography: A New Dimension in Data Security
, by Carl H. Meyer and Stephen M. Matyas, Wiley, New York, 1982.Google Scholar
One Way Hash Functions and DES, by Ralph C. Merkle, Crypto '89.
Data Encryption Standard (DES), Federal Information Processing Standards Publication 46, National Bureau of Standards (U.S.), National Technical Information Service, Springfield, VA, April 1977.
Cryptography and Computer Privacy, by H. Feistel, Scientific American, Vol. 228, No. 5, May 1973, pages 15–23.
Maximum Likelihood Estimation Applied to Cryptanalysis, by Dov Andelman, Ph.D. thesis, Stanford University, 1979.
Secure program code with modification detection code, by Carl H. Meyer and Michael Schilling, Proceedings of the Fifth Worwide Congress on Computers and Communication Security and Protection—Securicom '88, SEDEP, Paris, pages 111–130.
Cryptography—a state of the art review, by Carl H. Meyer, Proceedings of the Third Annual European Computer Conference—Comeuro '89, Hamburg, May 8–12, 1989, pages 150–154.
Design Principles for Hash Functions, by Ivan Damgaard, Crypto '89.
Don Coppersmith, private communication.
The MD4 Message Digest Algorithm, by Ron Rivest, Crypto '90.
Unpublished cryptanalysis of the 2-pass version of Snefru by Eli Biham.