Content deleted Content added
No edit summary |
No edit summary |
||
Line 1:
==
It seems out of place to have an article dedicated to [[Provably secure cryptographic hash function]]s when only the second half of the article discusses these functions, where as the first half discusses security of hash functions in general.
===Move Proposal===
{{Requested move/dated|Security of cryptographic hash functions}}
[[:Provably secure cryptographic hash function]] → {{no redirect|Security of cryptographic hash functions}} – Possibly move this article to [[Security of cryptographic hash functions]] and then incorporate the content of [[Cryptographic hash function#Properties]] and [[Provably secure cryptographic hash function#Types of Security of Hash Functions]] along with a section about Provably secure cryptographic hash functions. [[User:RavelTwig|RavelTwig]] ([[User talk:RavelTwig|talk]]) 02:11, 28 January 2014 (UTC)
===Merge Proposal===
OR merge this article into a "Security" section under [[Cryptographic hash function]] and then add subsection Provably secure cryptographic hash function.
|