National Institute of Standards and Technology: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. November 2010. S. 45. doi:10.6028/NIST.IR.7896
National Institute of Standards and Technology: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. November 2010. S. 57. doi:10.6028/NIST.IR.7896
National Institute of Standards and Technology: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. November 2010. S. 33. doi:10.6028/NIST.IR.7896
iacr.org
eprint.iacr.org
Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang and Shuang Wu: Analysis of BLAKE2. S. 4 (PDF; 397 kB).