Our first aim is flexibility: we work the way you want us to work.
Your company has a team of skilled programmers and you just want us to assist them by providing backup on the technical aspects of the cryptosystem they are implementing? All right for us.
You feel cryptographic modules are a much too sensitive component for a non security-trained programmer and would prefer to see them developed and tested off-site? It is fine, too.
All we need is to make sure we agree on the modus operandi and its implications. The decision is up to you.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
NIST is issuing a tentative agenda for the development of a SHA successor
Does the proof of the Riemann hypothesis really bring the whole of ecommerce to its knees?
The Cost of Insecurity: Understanding the “Non-Loss” Benefit of Cryptography
The Cost of “Just Enough” Security: Why Good Cryptography isn’t More Expensive
Cryptographer Consulting: Security Transparency vs. Relying on Ourselves
Why do people believe they should handle cryptography themselves?
The Illusion of Simplicity: Why Designing Your Own Cryptography Fails
Why Do I Need a Cryptographer?
Founding Members
Academic and Historical References
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs