[1]
Jasek, R. 2015. SHA-1 and MD5 Cryptographic Hash Functions: Security Overview. Communications - Scientific letters of the University of Zilina. 17, 1 (Feb. 2015), 73-80.