[Federal Information Processing Standards Publication 180-4: Secure Hash Standard (SHS)](https://ieeexplore.ieee.org/document/6133253)

Federal Information Processing Standards Publication 180-4: Secure Hash Standard (SHS)

The standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated.

National Institute of Standards and Technology
[The Byzantine Generals Problem](https://lamport.azurewebsites.net/pubs/byz.pdf)

The Byzantine Generals Problem

Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others....

Leslie Lamport, Robert Shostak, Marshall Pease