Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

3 min read

Implementing Digital Authentication Per NIST Guidelines (SP 800-63-3)

In 2016, the National Institute of Standards and Technology (NIST) (run by the US Department of Commerce) announced they were producing a new...

Read More

7 min read

Digital authentication - factors, mechanisms and schemes

Indiana University defines authentication as "the process of determining whether someone or something is who or what it is declared to be."...

Read More
Digital signatures in mobile banking and payment processing

3 min read

Digital signatures in mobile banking and payment processing

Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and...

Read More

3 min read

How eIDAS affects the USA

On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...

Read More

3 min read

Understanding non-repudiation of origin and non-repudiation of emission

This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...

Read More

3 min read

E-signatures in elections: The key to preventing voter fraud?

Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...

Read More

4 min read

How Digital Signatures and Blockchains Can Work Together

Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...

Read More

3 min read

Using The AdES Standard for Mobile and Distributed Environments

AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...

Read More

3 min read

The Role of Central Signing and Authentication in e-Government Security

Year after year, more stories surface about large scale data loss from e-government systems across the world.

Read More