@inproceedings{merkle1988digital,
  title={A digital signature based on a conventional encryption function},
  author={Merkle, Ralph C},
  booktitle={Advances in Cryptology—CRYPTO’87},
  pages={369--378},
  year={1988},
  organization={Springer}
}

@article{anderson1993classification,
  title={The classification of hash functions},
  author={Anderson, Ross},
  year={1993},
  publisher={Citeseer}
}

@book{viega2003secure,
  title={Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation \& More},
  author={Viega, John and Messier, Matt},
  year={2003},
  publisher={O'Reilly Media, Inc.}
}

@manual{CryptoNote:2014,
      title  = "Monero Network Exploit Post-Mortem",
      author = "Werner Albert",
      note   = "\url{https://forum.cryptonote.org/viewtopic.php?f=7&t=270}",
      year   = "2014 (accessed Sept 15, 2014)"
    }