Talk:Security of cryptographic hash functions
![]() | Cryptography: Computer science Start‑class | ||||||||||||
|
![]() | Computer security: Computing Start‑class | |||||||||||||||||
|
Restructuring proposal
It seems out of place to have an article dedicated to Provably secure cryptographic hash functions when only the second half of the article discusses these functions, where as the first half discusses security of hash functions in general. Also, the first half of this article is redundant with information given in the first half of Cryptographic hash function. This article appears to be trying to discuss the security of hash functions in general in addition to providing information on "provably secure" ones. — Preceding unsigned comment added by RavelTwig (talk • contribs) 01:52, 28 January 2014
- Both proposals seem uncontroversial. I'll do the move myself. You can feel free to also do the merge. Let me know if you need any help with this (I know nothing about the subject at hand, but I can help perform the merge). --BDD (talk) 18:34, 12 February 2014 (UTC)
Move Proposal
![]() | The request to rename this article to Security of cryptographic hash functions has been carried out.
If the page title has consensus, be sure to close this discussion using {{subst:RM top|'''page moved'''.}} and {{subst:RM bottom}} and remove the {{Requested move/dated|…}} tag, or replace it with the {{subst:Requested move/end|…}} tag. |
Provably secure cryptographic hash function → Security of cryptographic hash functions – Possibly move this article to Security of cryptographic hash functions and then incorporate the content of Cryptographic hash function#Properties and Provably secure cryptographic hash function#Types of Security of Hash Functions along with a section about Provably secure cryptographic hash functions. Relisted. BrownHairedGirl (talk) • (contribs) 18:07, 5 February 2014 (UTC) RavelTwig (talk) 02:11, 28 January 2014 (UTC)
Merge Proposal
OR merge this article into a "Security" section under Cryptographic hash function and then add subsection Provably secure cryptographic hash function.
- Start-Class Cryptography articles
- Unknown-importance Cryptography articles
- Start-Class Computer science articles
- Unknown-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- Start-Class Computer security articles
- Unknown-importance Computer security articles
- Start-Class Computer security articles of Unknown-importance
- Start-Class Computing articles
- Unknown-importance Computing articles
- All Computing articles
- All Computer security articles
- Requested moves