SHA-256 and its more advanced counterparts are considered robust and resistant to attacks due to several key features:
These features make SHA-256 and similar hash functions suitable for securing sensitive data, verifying data integrity, and other cryptographic applications where robustness and resistance to attacks are paramount.
https://ocw.mit.edu/courses/6-046j-design-and-analysis-of-algorithms-spring-2015/6741d65be662edac7c169c4081b3bd9a_MIT6_046JS15_lec21.pdf
What hash is more secure, SHA256, SHA512, or MD5? | IToolkit
https://medium.com/@mohaisen/cryptographic-hash-functions-a-hands-on-introduction-100c93a79f65
https://medium.com/@millennialdev/lesson-5-cryptographic-hashing-ca00fe459baf
A Deep Dive into SHA-256: Working Principles and Applications | by Madan | Medium