S. Gueron and V. Krasnov, Parallelizing message schedules to accelerate the computations of hash functions, Journal of Cryptographic Engineering, vol.2, issue.4, pp.241-253, 2012.
DOI : 10.1007/s13389-012-0037-z

S. Gueron and V. Krasnov, Simultaneous Hashing of Multiple Messages, Journal of Information Security, vol.03, issue.04, pp.319-325, 2012.
DOI : 10.4236/jis.2012.34039

I. Damgård, A Design Principle for Hash Functions, CRYPTO '89: Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, pp.416-427, 1990.
DOI : 10.1007/0-387-34805-0_39

R. C. Merkle, Secrecy, authentication, and public key systems, 1979.

R. C. Merkle, Protocols for Public Key Cryptosystems, 1980 IEEE Symposium on Security and Privacy, pp.122-134, 1980.
DOI : 10.1109/SP.1980.10006

N. Ferguson, S. L. Bauhaus, B. Schneier, D. Whiting, M. Bellare et al., The skein hash function family (version 1, 2009.

J. Aumasson, S. Neves, Z. Wilcox-o-'hearn, and C. Winnerlein, BLAKE2: Simpler, Smaller, Fast as MD5, Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS'13, pp.119-135, 2013.
DOI : 10.1007/978-3-642-38980-1_8

R. L. Rivest, B. Agre, D. V. Bailey, C. Crutchfield, Y. Dodis et al., The md6 hash function: A proposal to nist for, p.3, 2008.

P. Sarkar and P. J. Schellenberg, A Parallel Algorithm for Extending Cryptographic Hash Functions, Progress in Cryptology -INDOCRYPT 2001, Second International Conference on Cryptology in India, pp.40-49, 2001.
DOI : 10.1007/3-540-45311-3_4

P. Sarkar and P. J. Schellenberg, A parallelizable design principle for cryptographic hash functions, IACR Cryptology ePrint Archive, p.31, 2002.

P. Pal and P. Sarkar, PARSHA-256 ??? A New Parallelizable Hash Function and a Multithreaded Implementation, Fast Software Encryption, 10th International Workshop, FSE 2003, pp.347-361, 2003.
DOI : 10.1007/978-3-540-39887-5_25

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, Sufficient conditions for sound tree and sequential hashing modes, Cryptology ePrint Archive, Report, p.210, 2009.

S. Gueron, Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA- 256, IACR Cryptology ePrint Archive, vol.170, p.2014, 2014.