On a probabilistic approach to the security analysis of cryptographic hash functions. Cryptology ePrint report 2004/324 (2004)

by G Laccetti, G Schmid