1) It is trivial for someone to cause a collision (in fact effectively indefinitely many) with other inputs they control. 2) It's almost certainly not too hard for someone motivated to generate ...
Compare SHA-256 vs Keccak-256 cryptographic hash functions, security, performance, and blockchain applications.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results