1.
Al-Asad G, Al-Husainy M, Bani-Hani M, Al-Zu’bi A, Albatienh S, Abuoliem H. Comparative Assessment of Hash Functions in Securing Encrypted Images. Eng. Technol. Appl. Sci. Res. [Internet]. 2024 Dec. 2 [cited 2025 Jan. 21];14(6):18750-5. Available from: https://etasr.com/index.php/ETASR/article/view/8961