1.
CRYPTOGRAPHIC HASH FUNCTIONS –A SURVEY. IJESMR [Internet]. 2017 Jan. 30 [cited 2026 Apr. 27];4(1):102-8. Available from: https://ijesmr.com/index.php/ijesmr/article/view/301