Our first aim is flexibility: we work the way you want us to work.
Your company has a team of skilled programmers and you just want us to assist them by providing backup on the technical aspects of the cryptosystem they are implementing? All right for us.
You feel cryptographic modules are a much too sensitive component for a non security-trained programmer and would prefer to see them developed and tested off-site? It is fine, too.
All we need is to make sure we agree on the modus operandi and its implications. The decision is up to you.
Secure Hash Standard (SHS)
SHA-1 Broken: Collision Attack Found, Implications for Cryptography
ahs_agenda.html
about_riemann.html
76.html
75.html
74.html
73.html
72.html
70.html
60.html
50.html
What Is Our Methodology?
Security Courses, Cryptography Consulting, System Evaluation & TTP Services
Bridging The Gap Between Scientific Research And Industry Needs