Husain, Rashid, Rabia Khan, and Rajesh Kumar Tyagi. “SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT”. International Journal of Engineering Technologies and Management Research 7, no. 6 (June 27, 2020): 131–140. Accessed September 21, 2025. https://www.granthaalayahpublication.org/ijetmr-ojms/ijetmr/article/view/IJETMR20_A06_2119.