Inside SHA-3 | IEEE Journals & Magazine | IEEE Xplore