Husain, R., R. Khan, and R. K. Tyagi. “SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT”. International Journal of Engineering Technologies and Management Research, vol. 7, no. 6, June 2020, pp. 131-40, doi:10.29121/ijetmr.v7.i6.2020.705.