"And Jesus H. Tap Dancing Christ, what
the F is RSA doing on that list?
Getting smeared! (sigh)
The CA identified by Sotirov et al as owned by "RSA Data Security" was actually RSA's original "Secure Server Certification Authority." It was legally transferred from RSADSI to VeriSign back in 1995, when RSA spun off VeriSign as an independent entity. (Apparently the designated names of root CA can't be changed while they are operational.)
RSA, now part of EMC, still runs two root CA, both of which use SHA1 digests.
This is an all-VeriSign show. All the CAs listed as potentially vulnerable to a MD5 collision attack are owned or controlled by VeriSign.
Keep the number of passes in a compiler to a minimum. -- D. Gries