High-Assurance Cryptography: Cryptographic Software We Can Trust

被引:6
作者
Barthe, Gilles [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
关键词
Algorithm design and analysis; Computers; Cryptography; Libraries; Software; Standards;
D O I
10.1109/MSP.2015.112
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In response to recent cyberattacks, mathematicians, cryptographers, and security experts have advocated developing alternative approaches for building 'high-assurance' cryptographic software. There's evidence that computer tools that deliver high-assurance cryptographic software are within our reach. © 2003-2012 IEEE.
引用
收藏
页码:86 / 89
页数:4
相关论文
共 16 条
[1]  
Almeida J., 2013, 2013316 CRYPT EPRINT
[2]  
[Anonymous], 2005, Report 2005/181
[3]   Verification of a Cryptographic Primitive: SHA-256 [J].
Appel, Andrew W. .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2015, 37 (02)
[4]  
Barthe G, 2015, 2015506 CRYPT EPRINT
[5]  
Barthe G., 2012, 2012695 CRYPT EPRINT
[6]  
Barthe Gilles, 2014, 2014422 CRYPT EPRINT
[7]  
Bayrak AG, 2013, LECT NOTES COMPUT SC, V8086, P293, DOI 10.1007/978-3-642-40349-1_17
[8]  
Beringer L., 2015, 24 USENIX SEC S USEN, P206
[9]   Implementing TLS with Verified Cryptographic Security [J].
Bhargavan, Karthikeyan ;
Fournet, Cedric ;
Kohlweiss, Markulf ;
Pironti, Alfredo ;
Strub, Pierre-Yves .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :445-459
[10]   Provable Security in the Real World [J].
Degabriele, Jean Paul ;
Paterson, Kenneth G. ;
Watson, Gaven J. .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :33-41