This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.
You can download it from the following link: https://packetstormsecurity.com/files/download/115079/TransferableStateAttackonIteratedHashingFunctions.pdf
Source: https://packetstormsecurity.com/files/115079/Transferable-State-Attack-On-Iterated-Hashing-Functions.html

