Template talk:Cryptography hash

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Separate line[edit]

Seems like notable SHA-3 candidates should be on a separate line from non-SHA-3 hashes. They're notable for different reasons from the old hash functions, and they're currently new and unanalyzed.

  • Existing hash functions: MD2/4/5, SHA-0/1/2, RIPEMD, LM hash, etc.
  • Notable SHA-3 candidates: Skein, MD6, CubeHash, etc. (Not every SHA-3 candidate is notable -- some have already been broken, for instance.)

For what it's worth. (Unsigned by IP on 2 December 2008)


Where would SipHash fit in this table? I would say under MAC functions, but I am not an expert on the subject. --Yxejamir (talk) 13:58, 19 January 2017 (UTC)