[Cryptography] Construction of cryptographic software.
hbaker1 at pipeline.com
Thu Dec 4 13:23:18 EST 2014
At 03:17 PM 12/2/2014, Tony Arcieri wrote:
>On Tue, Dec 2, 2014 at 1:44 PM, Ray Dillinger <bear at sonic.net> wrote:
>Would anybody else here like to share some of the techniques they use?
Good set of rules.
Most of these rules can be incorporated into a strong type system that is capable of enforcing these rules.
There have been a large number of papers which discuss various typing systems which can be used for such purposes.
For example, check out the references in this paper:
Size: 228 KB (233,053 bytes)
More information about the cryptography