Abstract :
In response to recent cyberattacks, mathematicians, cryptographers, and security experts have advocated developing alternative approaches for building "high-assurance" cryptographic software. There\´s evidence that computer tools that deliver high-assurance cryptographic software are within our reach.
Keywords :
cryptography; trusted computing; cryptographic software; cyberattacks; high-assurance cryptography; Algorithm design and analysis; Computer security; Cryptography; Libraries; Software engineering; computer-aided cryptography; cryptographic libraries; formal methods; proof assistants; security; security proofs;