R. A. Brualdi, Matrices of Zeros and Ones with Fixed Row and Column Sum Vectors, Linear Algebra and its Applications, pp.159-231, 1980.

L. Cox, Suppression Methodology and Statistical Disclosure Control, Journal of the American Statistical Association, vol.75, issue.370, pp.377-385, 1980.
DOI : 10.1080/01621459.1980.10477481

I. P. Fellegi, On the Question of Statistical Confidentiality, Journal of the American Statistical Association, vol.63, issue.3, pp.7-18, 1972.
DOI : 10.1080/01621459.1969.10501049

D. R. Fulkerson, Zero-one matrices with zero trace, Pacific Journal of Mathematics, vol.10, issue.3, pp.831-836, 1960.
DOI : 10.2140/pjm.1960.10.831

D. Gale, A theorem on flows in networks, Pacific Journal of Mathematics, vol.7, issue.2, pp.1073-1082, 1957.
DOI : 10.2140/pjm.1957.7.1073

R. M. Haber, Minimal term rank of a class of (0,1)-matrices, Canad, J. Math, vol.15, pp.188-192, 1963.

H. Yu and X. Wang, Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL, Lecture Notes in Computer Science, vol.4817, pp.206-226, 2007.
DOI : 10.1007/978-3-540-76788-6_17

H. Yu, G. Wang, G. Zhang, and X. Wang, The Second-Preimage Attack on MD4, Lecture Notes in Computer Science, vol.3810, pp.1-12, 2005.
DOI : 10.1007/11599371_1

M. Kao, D. Gusfield-hongbo, and . Yu, Efficient Detection and Protection of Information in Cross Tabulated Tables I: Linear Invariant Test, SIAM Journal on Discrete Mathematics, vol.6, issue.3, pp.460-473, 1993.
DOI : 10.1137/0406037

X. Wang and H. Yu, Efficient Collision Search Attacks on SHA-0, Lecture Notes in Computer Science, vol.3621, pp.1-16, 2005.
DOI : 10.1007/11535218_1

X. Wang, Y. Lisa-yin, and H. Yu, Finding Collisions in the Full SHA-1, Lecture Notes in Computer Science, vol.3621, pp.17-36, 2005.
DOI : 10.1007/11535218_2

X. Wang, X. Lai, D. Feng, H. Cheng, and X. Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Lecture Notes in Computer Science, vol.3494, pp.1-18, 2005.
DOI : 10.1007/11426639_1

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, Lecture Notes in Computer Science, vol.3494, pp.19-35, 2005.
DOI : 10.1007/11426639_2

A. Bert-den-boer and . Bosselaers, Collisions for the compression function of MD5, Lecture Notes in Computer Science, vol.765, pp.293-304, 1994.
DOI : 10.1007/3-540-48285-7_26

R. W. Irving and M. R. Jerrum, Three-dimensional Statistical Data Security Problems, SIAM Journal on Computing, vol.23, issue.1, pp.170-184, 1994.
DOI : 10.1137/S0097539790191010

H. J. Ryser, Combinatorial properties of matrices of zeros and ones, Canad, J. Math, vol.9, pp.371-377, 1957.

G. Sande, Automated cell suppression to preserve confidentiality of business statistics, Statist, J. United Nations ECE, vol.2, pp.33-41, 1984.