| Fox et al., “Practical Minimal Perfect Hash Functions for Large Database,” Communications of the ACM,, pp. 105-121, vol. 35, No. 1, Jan. 1992. |
| Menezes et al., Handbook of Applied Crytography, pp. 80-86, CRC Press, 1996. |
| Mehlhorn, Kurt, Data Structures and Algorithms, pp. 118-145, Springer-Verlag, 1977. |
| Motwani et al., Randomized Algorithms, pp. 213-229, Cambridge University Press, NY, 1995. |
| Dietzfelbinger et al., “Dynamic Perfect Hashing: Upper and Lower Bounds”, SIAM J. Computing, pp. 1-33, Jan. 7, 1990. |