1.
2 MTR. Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security. IJESAR [Internet]. 2016Oct.30 [cited 2025May18];2(5). Available from: https://ijesar.in/index.php/ijesar/article/view/58