Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

An 'open' sign hanging in a shop's glass door

2 min read

UK eIDAS & EU eIDAS: Implications for Cross-Border Transactions

The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...

Read More

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

2 min read

NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
What's_in_a_name_mathematics.jpg

2 min read

Q: What's in a Logo? A: Mathematics Behind the Design

Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...

Read More

2 min read

eIDAS and PSD2 – A perfect symphony in the digital marketplace?

The European Union is leading the way in the move towards the creation of a single digital market. There are many advantages a digital business has...

Read More

6 min read

Managing Risks in Cryptographic Key Management

With the growing need for cryptography solutions to protect digital assets and communications, the ever-present security holes in modern computer...

Read More
Manage, Handle and Control Your Own Key in the MS Azure Key Vault

2 min read

Control Your Key in the Microsoft Azure Key Vault

Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be...

Read More

3 min read

Payment & Banking Cryptography: Benefits of z/OS & Z Platform

This article looks at some reasons for popularity of the IBM mainframe platform in the banking sector and touches upon its limitation for...

Read More
Spectre-Meltdown

2 min read

Meltdown & Spectre: What You Need to Know About Key Protection

A number of serious security vulnerabilities, collectively known under the names of “Meltdown” and “Spectre” [1][2], have recently been discovered in...

Read More