Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

2 min read

Expert’s Guidelines on how to document a Key Management System

This article discusses the importance and usage of documentation for a key management system within an organization.

Read More

5 min read

Non-Repudiation of Origin and Non-Repudiation of Emission for Banks

Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered...

Read More

4 min read

Cryptographic Key Management Policy: a layered approach

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...

Read More

2 min read

Whitfield Diffie: the well-deserved laureate of the 2015 Turing Award

On June 11, 2016, Whitfield Diffie, a Technical Advisory Board member at Cryptomathic, and Martin E. Hellman, Professor Emeritus of Electrical...

Read More
What is a Qualified Digital Certificate for Electronic Signatures in eIDAS

2 min read

What is an eIDAS Qualified Certificate for Electronic Signatures?

Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures,...

Read More

2 min read

Trust Service Providers according to eIDAS

Under Regulation (EU) No 910/2014 (eIDAS), a Trust Service Provider (TSP) is defined as “a natural or a legal person who provides one or more trust...

Read More
A large red shipping container with eIDAS printed on the side, representing an Associated Signature Container

3 min read

What is an Associated Signature Container and How Does it Work?

When an electronic signature is created, it must be associated to the data that it is being used to secure. This is accomplished by creating a data...

Read More

4 min read

Understanding ZertES, the Swiss Federal Law on Electronic Signatures

On December 19, 2003, ZertES, the Swiss Federal law regarding the use of certification services with electronic signatures was approved into law.

Read More

3 min read

What Is An Electronic Signature Policy and How Do You Create One?

This article explains what an electronic signature policy is from the perspective of a CISO or other person required to maintain information security.

Read More