Singh, S. (2016). Security: hash function-authentications. International Research Journal of Engineering, IT & Scientific Research, 2(3), 16–32. Retrieved from https://sloap.org/journals/index.php/irjeis/article/view/484