Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a good paper that covers hashing graphs (including ones with cycles): "On Hashing Graphs" https://eprint.iacr.org/2012/352.pdf


Wow, very interesting.

Can you summarizd how the actual algorithm is supposed to work, ie its main ideas?

I am surprised to find that using sha hashes in a tree or DAG will leak information to people who shouldn't have it. Is this a serious flaw and how do these guys ultimately solve the problem? I read the paper but the algorithm seems a bit hard to understand and follow.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: