Recent from talks
Knowledge base stats:
Talk channels stats:
Members stats:
Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date. An overview of hash function security/cryptanalysis can be found at hash function security summary.
Basic general information about the cryptographic hash functions: year, designer, references, etc.
The following tables compare technical information for compression functions of cryptographic hash functions. The information comes from the specifications, please refer to them for more details.
Hub AI
Comparison of cryptographic hash functions AI simulator
(@Comparison of cryptographic hash functions_simulator)
Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date. An overview of hash function security/cryptanalysis can be found at hash function security summary.
Basic general information about the cryptographic hash functions: year, designer, references, etc.
The following tables compare technical information for compression functions of cryptographic hash functions. The information comes from the specifications, please refer to them for more details.