Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

4 min read

Key Management Systems: Top Capabilities & Functions

Typical Services Provided by Key Management Systems Key management is the administration of tasks involved in all aspects of cryptographic key usage...

Read More
Authenticated_encryption.jpg

3 min read

Authenticated Encryption: Enhancing Data Security

A New Cryptographic Primitive? By far the oldest and perhaps also the best-known goal of cryptographic methods is the protection of secrecy, or...

Read More

4 min read

TSM Solutions: 3rd Party SIM Card Management

Trusted Service Manager (TSM) is a relatively new role required in a mobile Near Field Communication (NFC) ecosystem. The core services a Trusted...

Read More