@inproceedings{merkle1988digital, title={A digital signature based on a conventional encryption function}, author={Merkle, Ralph C}, booktitle={Advances in Cryptology—CRYPTO’87}, pages={369--378}, year={1988}, organization={Springer} } @article{anderson1993classification, title={The classification of hash functions}, author={Anderson, Ross}, year={1993}, publisher={Citeseer} } @book{viega2003secure, title={Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation \& More}, author={Viega, John and Messier, Matt}, year={2003}, publisher={O'Reilly Media, Inc.} } @manual{CryptoNote:2014, title = "Monero Network Exploit Post-Mortem", author = "Werner Albert", note = "\url{https://forum.cryptonote.org/viewtopic.php?f=7&t=270}", year = "2014 (accessed Sept 15, 2014)" }