Gauruvarum, P.
, Kelsey, J.
, Knudsen, L.
and Thomsen, S.
(2010),
On Hash Functions Using Checksums, International Journal of Information Security, [online], https://doi.org/10.1007/s10207-009-0100-7
(Accessed March 14, 2025)