SINGH, S. Security: hash function-authentications. International research journal of engineering, IT & scientific research, [S. l.], v. 2, n. 3, p. 16–32, 2016. Disponível em: https://sloap.org/journals/index.php/irjeis/article/view/484. Acesso em: 16 jul. 2024.