(1)
Husain, R.; Khan , R.; Tyagi, R. K. SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT. Int. J. Eng. Tech. Mgmt. Res. 2020, 7, 131-140.