Special-Purpose Hardware for Attacking Cryptographic Systems
Cryptology

Stevens, M. (2012, January). Cryptanalysis of MD5 and SHA-1.