
Those users are not listed in my taxonomy but they could be listed thusly:
5. Users who need to computed a cryptographic or secure hash function directly on binary data
There are uncountably many of such users, yet Hash2 is not designed primarily for them. Although it is quite handy to be able to use the cryptographic primitives that Hash2 does provide, when they are needed. For example here:
Thank you for the answer. Interesting how different people have different assumptions. :) I know you are much more involved in boost and author of original paper so your's is
On Sat, Dec 7, 2024 at 1:06 AM Vinnie Falco