Return to Article Details Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions Download Download PDF