What do most attacks on hash functions involve? A. Finding collisions b. Regenerating millions of hashes and comparing them to the plain text that generates it c. Really good random guessing a. A and b b. A and c c. B and c

A. Finding collisions