cryptanalysis hash functions MD5 SHA-1
Software (theme 1)
Special-Purpose Hardware for Attacking Cryptographic Systems
Cryptology

Stevens, M.M.J. (2012, January). Cryptanalysis of MD5 and SHA-1.