Jasek, R. “SHA-1 and MD5 Cryptographic Hash Functions: Security Overview”. Communications - Scientific Letters of the University of Zilina, Vol. 17, no. 1, Feb. 2015, pp. 73-80, http://journals.uniza.sk/index.php/communications/article/view/396.