Folks:
I am working on a interface spec for messaging systems to both portable
and fixed hardware cryptographic modules. One thing that I have been
having particular difficulty finding is specific examples of
requirements for hardware crypto in real-world applications. I know
about the DMS and other military adventures, but what I am trying to
find is non-military applications, both inside and outside the
government.
If anyone has any information to share, I will summarize it and
redistribute it to the contributors.
Thanks in advance for any help you can offer.
Tom Jones