User blog comment:Tachyonic Encrypter/The Hedera Function/@comment-2033667-20141029202258

You should definitely be using recursion/induction for this.