3 min read
EMV Payment Security - Issuers
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...
3 min read
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...
3 min read
The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...
2 min read
A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...
4 min read
IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...
3 min read
This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...
4 min read
The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...
4 min read
National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...
3 min read
The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...
2 min read
Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in...