HUSAIN, R.; KHAN , R.; TYAGI, R. K. SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT. International Journal of Engineering Technologies and Management Research, [S. l.], v. 7, n. 6, p. 131–140, 2020. DOI: 10.29121/ijetmr.v7.i6.2020.705. Disponível em: https://www.granthaalayahpublication.org/ijetmr-ojms/ijetmr/article/view/IJETMR20_A06_2119. Acesso em: 29 mar. 2024.