Comparing two cryptographic hash algorithms: SHA-512 and whirlpool- a case study on file integrity monitoringFarah Al-Shareefi and Zahraa Al-BarmaniBIO Web Conf., 97 (2024) 00093DOI: https://doi.org/10.1051/bioconf/20249700093