What if the result length is variable, such as Scrypt's length parameter that dictates the length of the result?
Scrypt takes (password, salt, N, p, r, outLength, digestLength, MixFunctionLength) as parameters. Only outLength matters here since it is the length of the resulting hash, and OP can only change the first two params (password and salt).
If you change AES256 with a bigger version like AES512 then yes the chance rises.
The algorithm itself (such as using scrypt, cost factor of it,etc) determine the cost of finding a collision although that's not their purpose but a byproduct of making brute forcing harder. (The cost of finding a collision is already high due to the size being 256 bit.)