Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

4 min read

Introduction into XAdES for Trust Service Providers

The term XAdES stands for XML Advanced Electronic Signatures, which specifies a set of extensions that are used with the W3C recommendation for XML...

Read More

3 min read

Introduction into CAdES for Trust Service Providers

The term CAdES stands for CMS Advanced Electronic Signatures. The Cryptographic Message Syntax (CMS) provides a framework for digitally signed...

Read More

3 min read

Understanding the Major Terms Around Digital Signatures

The technology and terms that are involved with digital signing can be confusing. This article attempts to clarify meaning and implications of the...

Read More

3 min read

Understanding eIDAS

EIDAS is the European Regulation for the electronic identification and trust services for electronic transactions. It repeals Directive 1999/93/EC....

Read More

3 min read

Digital Signature Standards & Compliance - A Global View

This article introduces the most relevant digital signature standards for global players, governments and banks.

Read More

11 min read

Migrating from Magnetic Stripes to EMV Smart Cards: Key Considerations

Migrating from magnetic stripes to EMV based smart cards is a challenging endeavour for banks and their IT teams. Even for small banks, necessary...

Read More
Sercuring_web_applications_with_cryptographic_zones.jpg

2 min read

Securing Web applications with Cryptographic Zones

A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....

Read More
Reducing_Payment_Credit_Card_Fraud_By_Shifting_to_EMV_technology.jpg

10 min read

Reducing Payment Card Fraud by Shifting over to EMV Chip Technology

This article gives an insight into the EMV chip technology, which is being rolled out on a world-wide scale to increase the level of fraud protection...

Read More
Assignment_and_configuration_of_roles_in_a_cyrpto_key_management_system.jpg

2 min read

Assignment and Configuration of Roles in a Crypto Key Management System

This article introduces and describes the relevant roles needed to successfully manage a key management system in an organisation.

Read More