Husain, R., Khan , R. and Tyagi, R. K. (2020) “SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT”, International Journal of Engineering Technologies and Management Research, 7(6), pp. 131–140. doi: 10.29121/ijetmr.v7.i6.2020.705.