But keep in mind that this forum is still based on 1.1.15. The current version is 2.0.2. I’m not sure if the 2.x-branch has improved in this respect (haven’t looked at the code to protect my eyes), but it might…
SHA-2
Pseudo-collision attack against up to 46 rounds of SHA-256. SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård structure, from a one-way compression function itself built using the Davies–Meyer structure from a (classified) specialized block cipher. SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six ...