1. Sharma S, Khanum S (2022) Performance analysis of SHA 2 and SHA 3. In: Proceedings of the international conference on innovative computing and communication (ICICC)
2. Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani T (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):4085
3. Karthik S, Muruganandam A (2014) Data encryption and decryption by using triple DES and performance analysis of crypto system. IJSER 2(11):24–31
4. Vadhera P, Lall B (2014) Review paper on secure hashing algorithm and its variants. IJSR 3(6):629–632
5. Dworkin MJ (2015) SHA-3 standard: permutation-based hash and extendable-output functions. NIST FIPS