Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering 2007
DOI: 10.1145/1314436.1314442
|View full text |Cite
|
Sign up to set email alerts
|

Cryptol

Abstract: Communications security is paramount in defense applications. Thus cryptographic algorithms are employed everywhere, from smartcards to hand-held field radios to central servers. The cryptography has to be strong (no-one can break the algorithm), correctly and securely implemented (no-one can hack the code), and efficient (you don't notice it is being used).It can be very expensive to deploy high-grade cryptographic applications. Much of the cost is to meet certification requirements, where evaluators (indepen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 17 publications
references
References 0 publications
0
0
0
Order By: Relevance