Jasek, Roman. “SHA-1 and MD5 Cryptographic Hash Functions: Security Overview”. Communications - Scientific letters of the University of Zilina 17, no. 1 (February 28, 2015): 73-80. Accessed April 6, 2026. http://journals.uniza.sk/index.php/communications/article/view/396.