In SHA-512, W16 is dependent on
(a) W0,W3,W7,W13
(b) W3,W7,W11,W15
(c) W0,W1,W9,W14
(d) W0,W1,W10,W13
This question was addressed to me in an interview for internship.
Question is from Secure Hash Algorithms (SHA) topic in division Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security