Singh, S. (2016) “Security: hash function-authentications”, International research journal of engineering, IT & scientific research, 2(3), pp. 16–32. Available at: https://sloap.org/journals/index.php/irjeis/article/view/484 (Accessed: 16 July 2024).