{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How to generate derived program addresses using seeds and program IDs?","a":"Using the program ID and seed value, create an encryption algorithm. Common encryption algorithms include hashing algorithms (such as SHA-256, SHA-3, etc.) and cryptographic algorithms (such as RSA, ECC, etc.)."}]}],"pr":"0d9f52c71b256063b46650aa73d23c7753f61e7945f50c4d77ee9512b3c02197"}