2, M. T. R. (2016) “Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security”, International Journal of Engineering Science and Generic Research, 2(5). Available at: https://ijesar.in/index.php/ijesar/article/view/58 (Accessed: 18May2025).