IEEE Military Communications Conference, 2003. MILCOM 2003.
DOI: 10.1109/milcom.2003.1290218
|View full text |Cite
|
Sign up to set email alerts
|

Cryptol: high assurance, retargetable crypto development and validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(31 citation statements)
references
References 0 publications
0
29
0
Order By: Relevance
“…This seems to be already the approach in Cryptol [46], a Haskell based DSL for cryptography, where array dimensions are inferred using a strong type-system based on Hindley-Milner style polymorphism extended with arithmetic size constraints.…”
Section: Discussionmentioning
confidence: 99%
“…This seems to be already the approach in Cryptol [46], a Haskell based DSL for cryptography, where array dimensions are inferred using a strong type-system based on Hindley-Milner style polymorphism extended with arithmetic size constraints.…”
Section: Discussionmentioning
confidence: 99%
“…However, the currently published and employed domain-specific verification algorithms for such applications ( [14]) do not have the capability to verify critical components, such as memory blocks, of existing and future hardware designs in the NW space. The verification algorithms developed by this work support the analysis of such critical digital components with mathematical reasoning from automated theorem proving and model checking.…”
Section: Commonly Used Fv Techniques Includementioning
confidence: 99%
“…Lewis, Hoffman, and Browning [14] published a design and verification flow for implementing a single FPGA-based cryptographic system. This flow leverages a Domain Specific Language (DSL) named Cryptol and tools to support it.…”
Section: Cryptographic Applicationsmentioning
confidence: 99%
“…Outside the DSP domain, examples of DSLs with similar aims to ours include Cryptol (a DSL for cryptography from Galois, [17]) and Microsoft's Accelerator for programming various platforms, including GPUs and multicores [24]. In both Cryptol and Accelerator, all loops are unrolled during code generation.…”
Section: Domain Specific Languagesmentioning
confidence: 99%