1.
CRYPTOGRAPHIC HASH FUNCTIONS –A SURVEY. IJESMR [Internet]. 2017 Jan. 30 [cited 2026 Feb. 4];4(1):102-8. Available from: https://ijesmr.com/index.php/ijesmr/article/view/301