2 May 2012 by Sergey Alexandrovich Kryukov
The question is not really correct. First, the criterion "most secure" can not be strictly defined. Moreover, suppose you have some secure algorithm, without a flaw like a backdoor, which can use different hash sizes, a hash sizes being a parameter. You can always make it more "secure" by...