Information technology — Security techniques — Hash-functions —Part 1: GeneralAMENDMENT 1: Padding methods for sp...