[1]
M. T. R. 2, “Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security”, IJESAR, vol. 2, no. 5, Oct. 2016.