2, M. T. R. Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security. International Journal of Engineering Science and Generic Research, [S. l.], v. 2, n. 5, 2016. Disponível em: https://ijesar.in/index.php/ijesar/article/view/58. Acesso em: 18 may. 2025.