Wang Xiaoyun
Computer programming
MD5
Computing
Chaining
Frances Yao
Logic programming
Mathematics
SHA-2
Cryptographic hash functions
SHA-1
Behaviorism