[1]
“CRYPTOGRAPHIC HASH FUNCTIONS –A SURVEY”, IJESMR, vol. 4, no. 1, pp. 102–108, Jan. 2017, Accessed: Apr. 28, 2026. [Online]. Available: https://ijesmr.com/index.php/ijesmr/article/view/301