2, M. T. R. “Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security”. International Journal of Engineering Science and Generic Research, vol. 2, no. 5, Oct. 2016, https://ijesar.in/index.php/ijesar/article/view/58.