Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More
Person in an apron clicking a green arrow on a large touchscreen display

5 min read

Electronic Signatures: Which Industries Must Use E-Signatures?

Certain industries have a duty to protect confidential information, as well as a requirement for authentication - proving that a document was sent by...

Read More

5 min read

Resolving Common Pain Points of Key Management

Many organizations struggle with cryptographic key management for multiple reasons. However, these pain points can be resolved with the right tools.

Read More

2 min read

Creating eIDAS-Compliant Printouts of Digitally Signed Documents

This article describes a model that could enable an electronically signed document to be printed out and used as an original in legal proceedings, in...

Read More
The Union Jack atop a flagpole seen against a blue sky with fluffy white clouds

5 min read

Qualified Digital Signing and Electronic Signature UK Law

This article aims to demystify electronic signature UK law and explain how it supports all types of electronic transactions in accordance with UK...

Read More

5 min read

BYOK, CYOK, HYOK: Cloud Key Management Explained

Here we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these...

Read More
PSD2-eIDAS-Distributed-Authentication

8 min read

Distributed Authentication under PSD2: Explained

PSD2 breaks up the ways in which banks do their business, by forcing them to open up their APIs. By doing so, PSD2 challenges the way in which data...

Read More
Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More
Diagram that shows how to integrate an eIDAS Qualified Remote Signing solution with other business systems

3 min read

Integrating eIDAS Qualified Remote Signing Tools with Your Systems

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU, as the banking and financial...

Read More