[1]
S. Singh, “Security: hash function-authentications”, irjeis, vol. 2, no. 3, pp. 16–32, Mar. 2016.