Written by Dominik Joe Pantůček on February 6, 2020.
If you ever wondered, how does the cryptography Cryptoucan™ actually employ look like and how do the elliptic curves used actually look, now it is time you wonder no more. Read on to see what does the curve used for encryption look like!
Written by Jiří Keresteš on January 23, 2020.
Sometimes, you just need to use
gpg from a script. There’s a couple of ways to achieve your goals, and a lot of dead ends. Read on to learn more!
Written by Dominik Joe Pantůček on January 16, 2020.
Modern systems have become increasingly complex since the beginning of the computing revolution. As these systems are programmed by humans, it is really easy to create systems with erroneous behavior. A well-documented code lowers the risks of introducing bugs in the programs – which should be something to always aim to. Read on to see how we here at Trustica approach this problem.
Written by Dominik Joe Pantůček on January 9, 2020.
In one of our projects, we needed to write an HTTP application server in Racket. In this application server we needed to route HTTP requests to various methods of various modules. Read on how we slightly modified a simple syntax helper to ease this task for us.
Written by Dominik Joe Pantůček on January 2, 2020.
Developing a cryptographic solution means that the algorithm correctness is not an option. Not just for the hardware, firmware and application software, but also for manufacturing support software. Read on to see how we address this need.