3 min read
EBA On Customer Authentication Under PSD2: Inherence
A fundamental objective of the Revised Payment Services Directive (PSD2) has been to reduce the risk of fraud to the maximum extent possible and...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
3 min read
A fundamental objective of the Revised Payment Services Directive (PSD2) has been to reduce the risk of fraud to the maximum extent possible and...
5 min read
The World Wide Web Consortium or W3C as it is commonly known was founded in 1994 by the original architect of the World Wide Web, Tim Berners-Lee. It...
6 min read
With data protection standards, such as GDPR, and the sheer mass of data that companies collect and accumulate, the protection and control of...
2 min read
A well-rounded solution for securing digital transactions includes the use of both symmetric and asymmetric cryptography and keys. Each method of...
5 min read
In this second installment of a three-part series on symmetric key encryption technology, we look at the evolution of symmetric key encryption...
3 min read
In this final article in a 3-part series on symmetric key encryption technology, we look at the use of encryption modes with symmetric block ciphers,...
4 min read
In this article, the first of a 3-part series on symmetric key encryption technology, we will look at the principles of symmetric encryption, the two...
2 min read
In June 2019, the PCI Security Standards Council issued an information supplement titled PCI PIN Security Requirement 18-3 – Key Blocks, which...
2 min read
This article discusses recent warnings that a chosen-prefix collision attack on SHA-1 is now practical and cost-effective for attackers.