why Hemera works the way it does

design decisions behind the Hemera hash primitive.

philosophy

why-hemera — eight design principles: permanence, the tree, endofunction, self-reference, identity, unity, beauty, the name

the-name — etymology: Hemera in the Protogenoi, genealogy of hash names

parameters

parameters — rationale for every parameter (field, S-box, width, rounds, computational elegance)

chunk-size — why 4 KB chunks (10-point analysis)

architecture

sponge-only — why no compression mode (practical, economic, mathematical)

capacity — structured capacity: one function, unlimited contexts, cost analysis

content-ids — why raw 64-byte CIDs, no headers, endofunction closure

self-bootstrap — why self-bootstrapping, non-circularity argument

analysis

security — security margins, quantum resistance, ecosystem comparison

performance — hash rate, proving cost, steady-state adequacy

operations

migration — emergency protocols, no algorithm agility, storage proofs

Dimensions

explanation
nox/docs/explanation
nox explanations conceptual documentation — why nox works the way it does, the design choices behind it, and the consequences that emerge. these pages illuminate the architecture. for formal definitions, see reference/. for task-oriented instructions, see docs/guides/ (when available). pages | page…
bbg/docs/explanation
explanation
trident/docs/explanation
💡 Trident Explanation [← Documentation Index](/trident-docs-readme) Understanding-oriented. Deep dives into why Trident works the way it does, for readers who want the full picture. 🏗️ Core Architecture | Document | Description | |----------|-------------| |…
nebu/docs/explanation
finite field arithmetic an encyclopedia of the mathematics behind the Goldilocks field — from first principles to applications. every concept is grounded in the field we implement: p = 2⁶⁴ − 2³² + 1. foundations finite-fields — field axioms, existence and uniqueness, GF(p), characteristic, the…
rs/docs/explanation
explanation
zheng/docs/explanation
zheng explanations conceptual documentation — why zheng works the way it does, how proof systems compose, and what makes Whirlaway the right architecture for cyber. these pages illuminate the design. for formal definitions, see reference/. for the hash primitive, see hemera. for the VM whose traces…

Pages in this namespace

Local Graph