Return to Article Details Security Increasing of Hash Functions in Information Systems on the Basis of Multi-Iterative Hashing Algorithm with Several Modifiers Download Download PDF