On Tuesday, 24 October 2017 at 16:37:10 UTC, H. S. Teoh wrote:
(Having said all that, though, D is probably a far better language for implementing crypto algorithms -- built-in bounds checking would have prevented some of the worst security holes that have come to light recently, like Heartbleed and Cloudbleed.

Those were buffer overflows in parsers, not in cryptographic algorithms.

Reply via email to