(1)
2, M. T. R. Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security. IJESAR 2016, 2.