1.
Jasek R. SHA-1 and MD5 Cryptographic Hash Functions: Security Overview. Communications [Internet]. 2015Feb.28 [cited 2026Apr.6];17(1):73-0. Available from: http://journals.uniza.sk/index.php/communications/article/view/396