[1]
T. Brukštus, “Analysis and implementation of cryptographic hash functions in programmable logic devices”, MLA, vol. 8, no. 3, pp. 321–326, Jun. 2016, doi: 10.3846/mla.2016.927.