(1)
Jasek, R. SHA-1 and MD5 Cryptographic Hash Functions: Security Overview. Communications 2015, 17, 73-80.