top | item 45096056

(no title)

dgshsg | 6 months ago

We'll have to deal with it forever in network protocols. Thankfully that's rather walled off from most software.

discuss

order

newpavlov|6 months ago

As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons.

NooneAtAll3|6 months ago

just call it 2-AHS and you're done :)