Articles from: CRYPSYS secure computing