Content deleted Content added
m Disambiguate MD2 to MD2 (cryptography) using popups |
clean up using AWB |
||
Line 1:
{{Orphan|date=February 2009}}
The following tables compare general and technical information for a number of [[cryptographic hash function]]s. Please see the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date.
== General information ==
Line 91 ⟶ 90:
! rowspan="2"|Specification
|-
! [[
! [[Cryptographic hash function|Digest]]
! [[Merkle–Damgård construction|Chaining<br />values]]<ref group="cf">The size of message digest equals to the size of chaining values usually. In truncated versions of certain cryptographic hash functions such as SHA-384, the former is less than the latter.</ref>
Line 268 ⟶ 267:
! [[Preimage attack|Second<br />preimage]]
! [[Preimage attack|Preimage]]
|-
| [[RIPEMD]]
Line 344 ⟶ 342:
== See also ==
*[[List of hash functions]]
*[[
==References==
{{Reflist}}
== External links ==
|