[1]
I. Malviya and T. Chetty, “Performance and Limitation Review of Secure Hash Function Algorithm”, IJRITCC, vol. 7, no. 6, pp. 48–51, Jun. 2019.