Return to Article Details Analysis of Cryptographic Utilization with Merkle-Damgård Algorithm Download Download PDF