Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

4 min read

Understanding ZertES: The Swiss Law on Electronic Signatures

On December 19, 2003, ZertES, the Swiss Federal law regarding the use of certification services with electronic signatures was approved into law.

Read More

3 min read

What Is An Electronic Signature Policy and How Do You Create One?

This article explains what an electronic signature policy is from the perspective of a CISO or other person required to maintain information security.

Read More

4 min read

XAdES for Trust Service Providers: An Introduction

The term XAdES stands for XML Advanced Electronic Signatures, which specifies a set of extensions that are used with the W3C recommendation for XML...

Read More

3 min read

CAdES Standards for Trust Service Providers Explained

The term CAdES stands for CMS Advanced Electronic Signatures. The Cryptographic Message Syntax (CMS) provides a framework for digitally signed...

Read More

3 min read

Key Terms Around Digital Signatures: A Guide

The technology and terms that are involved with digital signing can be confusing. This article attempts to clarify meaning and implications of the...

Read More

3 min read

What Does XAdES Mean? The Full Scope and Requirements

EIDAS is the European Regulation for the electronic identification and trust services for electronic transactions. It repeals Directive 1999/93/EC....

Read More

3 min read

Digital Signature Standards & Compliance - A Global View

This article introduces the most relevant digital signature standards for global players, governments and banks.

Read More

11 min read

Migrating from Magnetic Stripes to EMV: Key Considerations

Migrating from magnetic stripes to EMV based smart cards is a challenging endeavour for banks and their IT teams. Even for small banks, necessary...

Read More
Sercuring_web_applications_with_cryptographic_zones.jpg

2 min read

Understanding: Web Applications with Cryptographic Zones

A cryptographic zone exists between two points, where a symmetric key or asymmetric public keys are shared in order to encrypt sensitive information....

Read More