1.
Singh S. Security: hash function-authentications. IRJEIS [Internet]. 2016 Mar. 31 [cited 2026 Apr. 19];2(3):16-32. Available from: https://sloap.org/journals/index.php/irjeis/article/view/484