sha
https://crypto.stackexchange.com/questions/68307/what-is-the-difference-between-sha-3-and-sha-256
https://www.csoonline.com/article/3256088/why-arent-we-using-sha3.html
https://blog.csdn.net/qq_29583513/article/details/78866461
https://csrc.nist.gov/csrc/media/projects/hash-functions/documents/burr_dimacs2013_presentation.pdf
https://security.stackexchange.com/questions/21112/what-is-sha-3-and-why-did-we-change-it#:~:text=There%27s%20at%20least%20one%20usage%20for%20which%20SHA-2,quarter%20of%20the%20time%20to%20run%20in%20hardware.