Cryptographic Hash Functions. door Martin J. Cochran