Singh, Saroj. “Security: Hash Function-Authentications”. International research journal of engineering, IT and scientific research 2, no. 3 (March 31, 2016): 16–32. Accessed April 19, 2026. https://sloap.org/journals/index.php/irjeis/article/view/484.