Return to Article Details χ2 Attacks on Block-Cipher based Compression Functions Download Download PDF