1.
CRYPTOGRAPHIC HASH FUNCTIONS –A SURVEY. IJESMR. 2017;4(1):102-108. Accessed April 27, 2026. https://ijesmr.com/index.php/ijesmr/article/view/301