Content deleted Content added
redundant WikiProject tag |
|||
Line 4:
==Restructuring proposal==
It seems out of place to have an article dedicated to [[Provably secure cryptographic hash function]]s when only the second half of the article discusses these functions, where as the first half discusses security of hash functions in general. Also, the first half of this article is redundant with information given in the first half of [[Cryptographic hash function]]. This article appears to be trying to discuss the security of hash functions in general in addition to providing information on "provably secure" ones. <small><span class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[User:RavelTwig |RavelTwig ]] ([[User talk:RavelTwig |talk]] • [[Special:Contributions/RavelTwig |contribs]]) 01:52, 28 January 2014</span></small><!-- Template:Unsigned -->
:Both proposals seem uncontroversial. I'll do the move myself. You can feel free to also do the merge. Let me know if you need any help with this (I know nothing about the subject at hand, but I can help perform the merge). --[[User:BDD|BDD]] ([[User talk:BDD|talk]]) 18:34, 12 February 2014 (UTC)
{{Requested move/dated|Security of cryptographic hash functions}}
[[:Provably secure cryptographic hash function]] → {{no redirect|Security of cryptographic hash functions}} – Possibly move this article to [[Security of cryptographic hash functions]] and then incorporate the content of [[Cryptographic hash function#Properties]] and [[Provably secure cryptographic hash function#Types of Security of Hash Functions]] along with a section about Provably secure cryptographic hash functions. <small>'''Relisted'''. [[User:BrownHairedGirl|<span style="color:#663200;">Brown</span>HairedGirl]] <small>[[User talk:BrownHairedGirl|(talk)]] • ([[Special:Contributions/BrownHairedGirl|contribs]])</small> 18:07, 5 February 2014 (UTC)</small> [[User:RavelTwig|RavelTwig]] ([[User talk:RavelTwig|talk]]) 02:11, 28 January 2014 (UTC)
OR merge this article into a "Security" section under [[Cryptographic hash function]] and then add subsection Provably secure cryptographic hash function.
|