As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.
just call it 2-AHS and you're done :)
just call it 2-AHS and you're done :)