Christian Rechberger
It is now already two years since the first theoretical attacks on the popular hash function SHA-1 have been announced.