Talk:Security of cryptographic hash functions
Restructuring proposal
It seems out of place to have an article dedicated to Provably secure cryptographic hash functions when only the second half of the article discusses these functions, where as the first half discusses security of hash functions in general. Also, the first half of this article is redundant with information given in the first half of Cryptographic hash function. This article appears to be trying to discuss the security of hash functions in general in addition to providing information on "provably secure" ones.
Move Proposal
![]() | The request to rename this article to Security of cryptographic hash functions has been carried out.
If the page title has consensus, be sure to close this discussion using {{subst:RM top|'''page moved'''.}} and {{subst:RM bottom}} and remove the {{Requested move/dated|…}} tag, or replace it with the {{subst:Requested move/end|…}} tag. |
Provably secure cryptographic hash function → Security of cryptographic hash functions – Possibly move this article to Security of cryptographic hash functions and then incorporate the content of Cryptographic hash function#Properties and Provably secure cryptographic hash function#Types of Security of Hash Functions along with a section about Provably secure cryptographic hash functions. RavelTwig (talk) 02:11, 28 January 2014 (UTC)
Merge Proposal
OR merge this article into a "Security" section under Cryptographic hash function and then add subsection Provably secure cryptographic hash function.