Comparing two cryptographic hash algorithms: SHA-512 and whirlpool- a case study on file integrity monitoring
BIO Web Conf., 97 (2024) 00093
Published online: 05 April 2024
DOI: 10.1051/bioconf/20249700093