Brief review on journey of secured hash algorithms | IEEE Conference Publication | IEEE Xplore