1.
Boyanov P. PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES: PRACTICAL APPLICATIONS OF HASH FUNCTIONS MD5, SHA-1, AND SHA-256 USING VARIOUS SOFTWARE TOOLS TO VERIFY THE INTEGRITY OF FILES. JSAR [Internet]. 2024 Nov. 13 [cited 2024 Nov. 24];27(1):120-37. Available from: https://jsar.ftn.shu.bg/ojs-3.3.0-7/index.php/jsar/article/view/413