Information technology — Security techniques — Lightweight cryptography —Part 5: Hash-functionsTechnologies de l’i...