Verification of Implementations of Cryptographic Hash Functions | IEEE Journals & Magazine | IEEE Xplore