(1)
Singh, S. Security: Hash Function-Authentications. irjeis 2016, 2, 16-32.