Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

Crypto-Agility: The Real Gold (Standard) at the End of the Rainbow

3 min read

Crypto-agility: The Gold at the End of the Rainbow for NIST PQC

Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...

Read More
Diagram that shows how to integrate an eIDAS Qualified Remote Signing solution with other business systems

3 min read

How to Integrate eIDAS Qualified Remote Signing Tools with Your Systems

The demand for remote digital signatures to enhance security and customer experience continues to grow across the EU, as the banking and financial...

Read More
4-pillars-of-eIDAS-Cryptomathic

3 min read

The four pillars of eIDAS

The eIDAS regulation sets the standard for electronic identification, electronic signatures, and trust services. It paves the way for delivering...

Read More

3 min read

Digital Identity and eIDAS in Banking

The eIDAS Regulation lays the groundwork for creating a robust digital identity framework. The idea is to provide EU citizens with a secure, robust...

Read More

3 min read

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More
An 'open' sign hanging in a shop's glass door

2 min read

UK eIDAS and EU eIDAS: Implications for Cross-Border & Digital Transactions

The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...

Read More

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

2 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
What's_in_a_name_mathematics.jpg

2 min read

Q: What's in a Logo? A: Mathematics

Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...

Read More