Husain, R., Khan , R., & Tyagi, R. K. (2020). SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT. International Journal of Engineering Technologies and Management Research, 7(6), 131–140. https://doi.org/10.29121/ijetmr.v7.i6.2020.705