MD5 attack <http://eprint.iacr.org/2004/199.pdf> SHA-1 (and SHA-0) <http://theory.csail.mit.edu/~yiqun/shanote.pdf> RSA paper on DSA weaknesses <http://www.rsasecurity.com/rsalabs/node.asp?id=2240>