[1] Deepti Bahel, Prerana Ghosh, Arundhyoti Sarkar, and Matthew A Lanham. Predicting blood donations using machine learning techniques. In CONFERENCE PROCEEDINGS BY TRACK, page 323.
[2] Bart Preneel. Cryptographic hash functions. European Transactions on Telecommunications, 5(4): 431–448, 1994.
[3] Charles H Bennett, Gilles Brassard, Claude Cr´epeau, and Ueli M Maurer. Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6):1915–1923, 1995.
[4] Wikipedia contributors, “cryptographic hash function - wikipedia, the free encyclopedia,”. [Online; acesso em 16 de julho de 2019]. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Cryptographic hash function&oldid=905916305, 2019.
[5] Alfr´ed R´enyi et al. On measures of entropy and information. In Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Contributions to the Theory of Statistics. The Regents of the University of California, 1961.
[6] Stefan Berens. Conditional renyi entropy. PhD thesis, Masters thesis, Mathematisch Instituut, Universiteit Leiden, 2013.
[7] J Lawrence Carter and Mark N Wegman. Universal classes of hash functions. Journal of computer and system sciences, 18(2):143–154, 1979.
[8] Douglas R. Stinson. Universal hashing and authentication codes. Designs, Codes and Cryptography, 4(3):369–380, 1994.
[9] Marcelo S Alencar and R T Alencar. Probability Theory. ISBN-13: 978-1-60650- 747-6 (print). New York, USA: Momentum Press, LLC, 2016.