Posts Authored By

Jasper Van der Jeugt

Contractor - Engineering

  1. Computing Cryptographic Hashes for Cyclic Dependencies

    Implementation of cryptographic hashes is theoretically not that hard, given a good cryptographic library. However, things get trickier when we want to allow dependency cycles. At that point, we get a bit of a chicken-and-egg problem. We need resource A’s hash to compute resource B’s hash, but that in turn depends on B’s hash again! Let's study the problem and solve it.

Go Fast. See Everything.
Get Cloud Right.