In here, you will find results-oriented software development tips, in the form of pointers to selected portions of scientific and/or technical reports. You will find useful guidance in selected areas of security software development (don't expect much source code in these pages).
We provide what you need to implement security systems that work and provide reliable services to end-users. To achieve this, consult the web pages below and contact us for fee-based ad-hoc development assistance.
The SAKEM procedure is implemented as a custom project according to the circumstances of each application.A character set specification used to accomodate different computing environments
Toy example of a public key cryptosystem (C program)
Software acceleration for the large integer arithmetic public key cryptographyPKC library for the Analog Devices integer DSP family (**)
Implementation of the Blum Blum & Shub Generator
Meta-DES implementation (**)
In case you are looking for a facsimile security protocol, here is a good one (assuming you have a budget to implement it!)
How to protect software integrity or hide a secret in an executable file?
CONNOTECH Experts-conseils Inc.
9130 Place de Montgolfier
Montréal, Québec, Canada, H2M 2A1
Tél.: +1-514-385-5691
Fax: +1-514-385-5900