FYI: This is a 2017 result:<p><a href="https://link.springer.com/chapter/10.1007/978-3-319-63688-7_19" rel="nofollow">https://link.springer.com/chapter/10.1007/978-3-319-63688-7_...</a><p>~<p><i>"This result is the product of a long term collaboration between the Cryptology Group at Centrum Wiskunde & Informatica (CWI) - the national research institute for mathematics and computer science in the Netherlands - and the Google Research Security, Privacy and Anti-abuse Group. Two years ago Marc Stevens and Elie Bursztein, who leads the Google's anti-abuse research team, began collaborating on making Marc's cryptanalytic attacks against SHA-1 practical by leveraging Google expertise and infrastructure. Since then many CWI researchers and Googlers have helped make this project possible, including Pierre Karpman who worked on the cryptanalysis and prototype GPU implementation, and from Google Ange Albertini who developed the PDF attack, Yarik Markov who took care of the distributed GPU code, Alex Petit-Bianco implemented the collision detector to protect Google users, Luca Invernizzi who created the online file checker, and Clement Blaisse who oversaw the reliability of the computations."</i><p><a href="https://www.cwi.nl/en/groups/cryptology/" rel="nofollow">https://www.cwi.nl/en/groups/cryptology/</a>
(2017)<p>Could Summit do it in a day?<p><a href="https://en.wikipedia.org/wiki/Summit_(supercomputer)" rel="nofollow">https://en.wikipedia.org/wiki/Summit_(supercomputer)</a>