Husain, Rashid, Rabia Khan, and Rajesh Kumar Tyagi. “SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT”. International Journal of Engineering Technologies and Management Research 7, no. 6 (June 27, 2020): 131–140. Accessed April 27, 2024. https://www.granthaalayahpublication.org/ijetmr-ojms/ijetmr/article/view/IJETMR20_A06_2119.