" We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products

JM Haney, M Theofanos, Y Acar… - Fourteenth Symposium on …, 2018 - usenix.org
Cryptography is an essential component of modern computing. Unfortunately, implementing
cryptography correctly is a non-trivial undertaking. Past studies have supported this …

Implementing post-quantum cryptography for developers

J Hekkala, M Muurman, K Halunen, V Vallivaara - SN Computer Science, 2023 - Springer
Widely used public key cryptography is threatened by the development of quantum
computers. Post-quantum algorithms have been designed for the purpose of protecting …

How usable are rust cryptography APIs?

K Mindermann, P Keck… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Context: Poor usability of cryptographic APIs is a severe source of vulnerabilities. Aim: We
wanted to find out what kind of cryptographic libraries are present in Rust and how usable …

[PDF][PDF] CogniCrypt-the secure integration of cryptographic software.

S Krüger - 2020 - bodden.de
Prior research has empirically laid bare the widespread misuse of cryptographic APIs in
software applications. Developers struggle with bad API design and lack of cryptographic …

Organizational practices in cryptographic development and testing

JM Haney, SL Garfinkel… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
Organizations developing cryptographic products face significant challenges, including
usability and human factors, that may result in decreased security, increased development …

Mitigating cryptographic mistakes by design

M Blochberger, T Petersen, H Federrath - 2019 - dl.gi.de
Developers struggle to integrate cryptographic functionality into their applications. Many
mistakes have been identified by related work and tools have been developed for detecting …

[PDF][PDF] A survey on key management of ZigBee network

ZA Davani, AA Manaf - Proceedings of the International Conference on E …, 2013 - Citeseer
ZigBee is short distance, low complexity, and low power consumption wireless personal
area network. As ZigBee has several applications in industry and healthcare, its security in …

[PDF][PDF] Analysing and improving the crypto ecosystem of Rust

P Keck - 2017 - d-nb.info
Context: Rust is an emerging systems programming language that suits security-critical
applications because it guarantees memory safety without a garbage collector. Its growing …

Enhancing key management of ZigBee network by steganography method

ZA Davani, AA Manaf - 2013 Second International Conference …, 2013 - ieeexplore.ieee.org
ZigBee is short distance, low complexity, low data rate, and low power consumption wireless
personal area network and it has several applications in industry and healthcare. One of the …

[PDF][PDF] Analysis Design & Applications of Cryptographic Building Blocks

C Forler - 2015 - core.ac.uk
This thesis deals with the basic design and rigorous analysis of cryptographic schemes and
primitives, especially of authenticated encryption schemes, hash functions, and password …