[1]
Redžepagić, .J. , Regvart, D. , Rudeš, H. and Petrunić, R. 2025. Vulnerabilities in cryptographic hash functions: A practical study of hash cracking techniques and security implications. Edelweiss Applied Science and Technology. 9, 2 (Feb. 2025), 2307–2317. DOI:https://doi.org/10.55214/25768484.v9i2.5072.