[1]
R. Jasek, “SHA-1 and MD5 Cryptographic Hash Functions: Security Overview”, Communications, vol. 17, no. 1, pp. 73-80, Feb. 2015.