logoalt Hacker News

newpavlovyesterday at 8:08 PM1 replyview on HN

As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.


Replies

NooneAtAll3today at 12:33 AM

just call it 2-AHS and you're done :)