This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions.
© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search