Our first aim is flexibility: we work the way you want us to work.

Your company has a team of skilled programmers and you just want us to assist them by providing backup on the technical aspects of the cryptosystem they are implementing? All right for us.

You feel cryptographic modules are a much too sensitive component for a non security-trained programmer and would prefer to see them developed and tested off-site? It is fine, too.

All we need is to make sure we agree on the modus operandi and its implications. The decision is up to you.