" We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products
Cryptography is an essential component of modern computing. Unfortunately, implementing
cryptography correctly is a non-trivial undertaking. Past studies have supported this …
cryptography correctly is a non-trivial undertaking. Past studies have supported this …
Implementing post-quantum cryptography for developers
J Hekkala, M Muurman, K Halunen, V Vallivaara - SN Computer Science, 2023 - Springer
Widely used public key cryptography is threatened by the development of quantum
computers. Post-quantum algorithms have been designed for the purpose of protecting …
computers. Post-quantum algorithms have been designed for the purpose of protecting …
How usable are rust cryptography APIs?
K Mindermann, P Keck… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Context: Poor usability of cryptographic APIs is a severe source of vulnerabilities. Aim: We
wanted to find out what kind of cryptographic libraries are present in Rust and how usable …
wanted to find out what kind of cryptographic libraries are present in Rust and how usable …
[PDF][PDF] CogniCrypt-the secure integration of cryptographic software.
S Krüger - 2020 - bodden.de
Prior research has empirically laid bare the widespread misuse of cryptographic APIs in
software applications. Developers struggle with bad API design and lack of cryptographic …
software applications. Developers struggle with bad API design and lack of cryptographic …
Organizational practices in cryptographic development and testing
JM Haney, SL Garfinkel… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
Organizations developing cryptographic products face significant challenges, including
usability and human factors, that may result in decreased security, increased development …
usability and human factors, that may result in decreased security, increased development …
Mitigating cryptographic mistakes by design
M Blochberger, T Petersen, H Federrath - 2019 - dl.gi.de
Developers struggle to integrate cryptographic functionality into their applications. Many
mistakes have been identified by related work and tools have been developed for detecting …
mistakes have been identified by related work and tools have been developed for detecting …
[PDF][PDF] A survey on key management of ZigBee network
ZigBee is short distance, low complexity, and low power consumption wireless personal
area network. As ZigBee has several applications in industry and healthcare, its security in …
area network. As ZigBee has several applications in industry and healthcare, its security in …
[PDF][PDF] Analysing and improving the crypto ecosystem of Rust
P Keck - 2017 - d-nb.info
Context: Rust is an emerging systems programming language that suits security-critical
applications because it guarantees memory safety without a garbage collector. Its growing …
applications because it guarantees memory safety without a garbage collector. Its growing …
Enhancing key management of ZigBee network by steganography method
ZigBee is short distance, low complexity, low data rate, and low power consumption wireless
personal area network and it has several applications in industry and healthcare. One of the …
personal area network and it has several applications in industry and healthcare. One of the …
[PDF][PDF] Analysis Design & Applications of Cryptographic Building Blocks
C Forler - 2015 - core.ac.uk
This thesis deals with the basic design and rigorous analysis of cryptographic schemes and
primitives, especially of authenticated encryption schemes, hash functions, and password …
primitives, especially of authenticated encryption schemes, hash functions, and password …