Jasek, R. (2015). SHA-1 and MD5 Cryptographic Hash Functions: Security Overview. Communications - Scientific Letters of the University of Zilina, 17(1), 73-80. Retrieved from http://journals.uniza.sk/index.php/communications/article/view/396