[1]
R. Husain, R. Khan, and R. K. Tyagi, “SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT”, Int. J. Eng. Tech. Mgmt. Res., vol. 7, no. 6, pp. 131–140, Jun. 2020.