Practical Applications of Hash Functions MD5, SHA-1, and SHA-256 Using Various Software Tools to Verify the Integrity of Files
Source:
Journal scientific and applied research, International Journal ,Volume: 27,
(2024)
4
Views
(2021):
Information & Security: An International Journal
47,
no. 3
(2020):
285-299.