J. P. Aumasson, L. Henzen, W. Meier, and R. C. Phan, SHA-3 proposal BLAKE. Submission to NIST, 2008.

J. P. Aumasson, S. Neves, Z. Wilcox-o-'hearn, C. Winnerlein, M. J. Jr et al., BLAKE2: Simpler, Smaller, Fast as MD5, ACNS. Lecture Notes in Computer Science, vol.7954, pp.119-135, 2013.
DOI : 10.1007/978-3-642-38980-1_8

M. Bellare, New Proofs for NMAC and HMAC: Security Without Collision-Resistance, Lecture Notes in Computer Science, vol.4117, pp.602-619, 2006.
DOI : 10.1007/11818175_36

M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Lecture Notes in Computer Science, vol.1109, pp.1-15, 1996.
DOI : 10.1007/3-540-68697-5_1

E. Biham and O. Dunkelman, A Framework for Iterative Hash Functions -HAIFA. IACR Cryptology ePrint Archive, Report, p.278, 2007.

I. Dinur and G. Leurent, Improved Generic Attacks against Hash-Based MACs and HAIFA, pp.149-168
DOI : 10.1007/s00453-016-0236-6

URL : https://hal.archives-ouvertes.fr/hal-01407953

V. Dolmatov and A. Degtyarev, 11-2012: Hash Function, GOST R RFCInformational ), vol.34, issue.6986, 2013.

N. Ferguson, S. Lucks, B. Schneier, D. Whiting, M. Bellare et al., The Skein hash function family, 2008.

P. Flajolet and A. M. Odlyzko, Random Mapping Statistics, Proceedings. Lecture Notes in Computer Science, vol.434, pp.329-354, 1989.
DOI : 10.1007/3-540-46885-4_34

URL : https://hal.archives-ouvertes.fr/inria-00075445

J. A. Garay and R. Gennaro, Advances in Cryptology -CRYPTO 2014 -34th Annual Cryptology Conference, Proceedings, Part I, 2014.

J. Guo, T. Peyrin, Y. Sasaki, and L. Wang, Updates on Generic Attacks against HMAC and NMAC, pp.131-148
DOI : 10.1007/978-3-662-44371-2_8

J. Guo, Y. Sasaki, L. Wang, M. Wang, and L. Wen, Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds, Fast Software Encryption -21st International Workshop, FSE 2014, pp.571-590, 2014.
DOI : 10.1007/978-3-662-46706-0_29

J. Guo, Y. Sasaki, L. Wang, and S. Wu, Cryptanalysis of HMAC/NMAC-Whirlpool, pp.21-40
DOI : 10.1007/978-3-642-42045-0_2

A. Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Lecture Notes in Computer Science, vol.3152, pp.306-316, 2004.
DOI : 10.1007/978-3-540-28628-8_19

J. Kelsey and T. Kohno, Herding Hash Functions and the Nostradamus Attack, Lecture Notes in Computer Science, vol.4004, pp.183-200, 2006.
DOI : 10.1007/11761679_12

J. Kelsey and B. Schneier, Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work, Lecture Notes in Computer Science, vol.3494, pp.474-490, 2005.
DOI : 10.1007/11426639_28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.9667

T. Kortelainen and J. Kortelainen, On Diamond Structures and Trojan Message Attacks, pp.524-539
DOI : 10.1007/978-3-642-42045-0_27

G. Leurent, T. Peyrin, and L. Wang, New Generic Attacks against Hash-Based MACs, IACR Cryptology ePrint Archive, vol.2014, issue.406, p.406, 2014.
DOI : 10.1007/978-3-642-42045-0_1

G. Leurent, T. Peyrin, and L. Wang, New Generic Attacks against Hash-Based MACs, Sako and Sarkar [25], pp.1-20
DOI : 10.1007/978-3-642-42045-0_1

E. R. Love, 64.4 Some Logarithm Inequalities, The Mathematical Gazette, vol.64, issue.427, pp.55-57, 1980.
DOI : 10.2307/3615890

Y. Naito, Y. Sasaki, L. Wang, and K. Yasuda, Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC, Lecture Notes in Computer Science, vol.8231, pp.83-98, 2013.
DOI : 10.1007/978-3-642-41383-4_6

P. C. Van-oorschot and M. J. Wiener, Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999.
DOI : 10.1007/PL00003816

T. Peyrin, Y. Sasaki, and L. Wang, Generic Related-Key Attacks for HMAC, ASIACRYPT. Lecture Notes in Computer Science, vol.7658, pp.580-597, 2012.
DOI : 10.1007/978-3-642-34961-4_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.6051

T. Peyrin and L. Wang, Generic Universal Forgery Attack on Iterative Hash-Based MACs, Advances in Cryptology -EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.147-164, 2014.
DOI : 10.1007/978-3-642-55220-5_9

G. Tsudik, Message authentication with one-way hash functions, ACM SIGCOMM Computer Communication Review, vol.22, issue.5, pp.29-38, 1992.
DOI : 10.1145/141809.141812

K. Yasuda, ???Sandwich??? Is Indeed Secure: How to Authenticate a Message with Just One Hashing, ACISP. Lecture Notes in Computer Science, vol.4586, pp.355-369, 2007.
DOI : 10.1007/978-3-540-73458-1_26