[1]
T. Brukštus, “Analysis and implementation of cryptographic hash functions in programmable logic devices”, MLA, vol. 8, no. 3, pp. 321-326, Jun. 2016.