top | item 45096056 (no title) dgshsg | 6 months ago We'll have to deal with it forever in network protocols. Thankfully that's rather walled off from most software. discuss order hn newest newpavlov|6 months ago As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons. NooneAtAll3|6 months ago just call it 2-AHS and you're done :)
newpavlov|6 months ago As well as in a number of widely spread cryptographic algorithms (e.g. SHA-2), which use BE for historic reasons. NooneAtAll3|6 months ago just call it 2-AHS and you're done :)
newpavlov|6 months ago
NooneAtAll3|6 months ago