[Cryptography] Construction of cryptographic software.

Henry Baker hbaker1 at pipeline.com
Thu Dec 4 13:23:18 EST 2014

At 03:17 PM 12/2/2014, Tony Arcieri wrote:
>On Tue, Dec 2, 2014 at 1:44 PM, Ray Dillinger <bear at sonic.net> wrote:
>Would anybody else here like to share some of the techniques they use?

Good set of rules.

Most of these rules can be incorporated into a strong type system that is capable of enforcing these rules.

There have been a large number of papers which discuss various typing systems which can be used for such purposes.

For example, check out the references in this paper:

Size: 228 KB (233,053 bytes)

More information about the cryptography mailing list