Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
0 points
newpavlov
6mo ago
0 comments
Share
As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.
undefined | Better HN
0 comments
default
newest
oldest
NooneAtAll3
6mo ago
just call it 2-AHS and you're done :)
j
/
k
navigate · click thread line to collapse