1.
Husain R, Khan R, Tyagi RK. SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT. Int. J. Eng. Tech. Mgmt. Res. [Internet]. 2020 Jun. 27 [cited 2024 Apr. 23];7(6):131-40. Available from: https://www.granthaalayahpublication.org/ijetmr-ojms/ijetmr/article/view/IJETMR20_A06_2119