Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA | IEEE Conference Publication | IEEE Xplore