[1]
D. Górniak and P. Kopniak, “Comparing the speed of the selected hash and encryption algorithms”, J. Comput. Sci. Inst., vol. 4, pp. 82–86, Sep. 2017.