Analysis and design of cryptographic hash functions, Mac algorithms by B. Van Rompay