Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The appendix details how one can do a sha256 style v8 algo that is basically v5 with the algorithm swapped. In theory one could do this for any hashing algorithm. https://www.rfc-editor.org/rfc/rfc9562.html#name-example-of-...

Though I am working on a way to solve this problem with UUIDs beyond 128 bits so we don't have to truncate the hash.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: