2011 Information Security for South Africa 2011
DOI: 10.1109/issa.2011.6027533
|View full text |Cite
|
Sign up to set email alerts
|

cPLC — A cryptographic programming language and compiler

Abstract: Cryptographic two-party protocols are used ubiquitously in everyday life. While some of these protocols are easy to understand and implement (e.g., key exchange or transmission of encrypted data), many of them are much more complex (e.g., ebanking and e-voting applications, or anonymous authentication and credential systems).For a software engineer without appropriate cryptographic skills the implementation of such protocols is often difficult, time consuming and error-prone. For this reason, a number of compi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The use of specific programming languages is not standard practice in secure software development. On the other hand, experts, such as cryptologists, usually prefer their knowledge expressed in its own syntax by domain-specific languages [25][26][27] [28].…”
Section: Cryptographic Programming Languagesmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of specific programming languages is not standard practice in secure software development. On the other hand, experts, such as cryptologists, usually prefer their knowledge expressed in its own syntax by domain-specific languages [25][26][27] [28].…”
Section: Cryptographic Programming Languagesmentioning
confidence: 99%
“…cPLC [25] is a cryptographic Programming Language and Compiler for generating Java implementations of two-party cryptographic protocols, such as Diffie-Hellman. cPCL's input language is strongly inspired by the standard notation for specifying protocols and is, allegedly, the first tool which can be used by cryptographically untrained software engineers to obtain sound implementations of arbitrary two-party protocols, as well as by cryptographers who want to efficiently implement their protocols designed on paper.…”
Section: Cryptographic Programming Languagesmentioning
confidence: 99%
“…Besides tools for ZK-PoK, there exists a large variety of other domain specific compilers, including Fairplay [44] and VIFF [30] for generating implementations of secure twoparty computations. Also, generic cryptographic compilers o↵ering di↵erently abstract input languages have been proposed, e.g., [4,54,9,40]. However, none of these tools supports formal verification.…”
Section: Related Workmentioning
confidence: 99%