[1]
Husain, R., Khan , R. and Tyagi, R.K. 2020. SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT. International Journal of Engineering Technologies and Management Research. 7, 6 (Jun. 2020), 131–140. DOI:https://doi.org/10.29121/ijetmr.v7.i6.2020.705.