Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
anonymousDan
on May 25, 2023
|
parent
|
context
|
favorite
| on:
UCLA computer grad constructs “crown jewel of cryp...
Would it be possible to use this to obfuscate other cryptographic primitives (e.g. a hash function or a simple program that checks whether the hash of some input equals a hardcoded value)?
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: