Figure 6. Block Diagram of Hash Function

From

Review on Network Security and Cryptography

Shyam Nandan Kumar

International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 1-11 doi:10.12691/iteces-3-1-1