Survey of Hash Functions
Wang Xiaoyun1,2 and Yu Hongbo3
Journal of Information Security Research . 2015, (1): 19 -30 .