Excerpts from "The Design and Verification of a Cryptographic Security Architecture" available