Jasek, R. (2015) “SHA-1 and MD5 Cryptographic Hash Functions: Security Overview”, Communications - Scientific letters of the University of Zilina, 17(1), pp. 73-80. Available at: http://journals.uniza.sk/index.php/communications/article/view/396 (Accessed: 6April2026).