In this answer, it was recommended that you add random padding when hashing messages for a trusted timestamp, such as for predictions, in order to avoid dictionary and brute force attacks (at least when the message itself doesn’t have much entropy, as in the example in the question).
The answer briefly says that 80 bits of entropy (at most 16 printable characters) should be enough to stop any attacker. Is there anywhere I can find more information about this? Most of the information I’m able to find is about hashing passwords, which isn’t particularly applicable (you need to be able to verify the password without having the user remember 80 bits of information, so analyses of random salts don’t particularly apply in this case, and bcrypt is overkill when you can use random padding).