Analysis and design of cryptographic hash functions, Mac algorithms door B. Van Rompay