CONNOTECH Experts-conseils Inc.

Developer's Tips


In here, you will find results-oriented software development tips, in the form of pointers to selected portions of scientific and/or technical reports. You will find useful guidance in selected areas of security software development (don't expect much source code in these pages).

We provide what you need to implement security systems that work and provide reliable services to end-users. To achieve this, consult the web pages below and contact us for fee-based ad-hoc development assistance.

SAKEM

The SAKEM procedure is implemented as a custom project according to the circumstances of each application.

A character set specification used to accomodate different computing environments

PEKE

Toy example of a public key cryptosystem (C program)

Mathematical Acceleration for Public Key Cryptography Implementation

Software acceleration for the large integer arithmetic public key cryptography

PKC library for the Analog Devices integer DSP family (**)

PRNG, Pseudo-Random Number Generation

Implementation of the Blum Blum & Shub Generator

DES Implementation

Meta-DES implementation (**)

Facsimile Security

In case you are looking for a facsimile security protocol, here is a good one (assuming you have a budget to implement it!)

Frogbit (encryption and data integrity in a stream-cipher arrangement)

How to protect software integrity or hide a secret in an executable file?


security scheme designalternative to PKIpatent publicationsSAKEMscholarly web contentsconsulting services ]
[ CONNOTECH home page: http://www.connotech.com/about us | e-mail to: info@connotech.com ]

CONNOTECH Experts-conseils Inc.
9130 Place de Montgolfier
Montréal, Québec, Canada, H2M 2A1
Tél.: +1-514-385-5691 Fax: +1-514-385-5900