Return to Article Details A comparative study of hash algorithms with the prospect of developing a CAN bus authentication technique Download Download PDF