CRYPTOMATHIC BLOG

 

3 min read

Digital Identity and eIDAS in Banking

The eIDAS Regulation lays the groundwork for creating a robust digital identity framework. The idea is to provide EU citizens with a secure, robust...

Read More

3 min read

Symmetric Cryptography in Financial Institutions: Key Management Challenges

This article addresses some of the challenges of symmetric cryptography as applied in banks, describing how it works and what are its unbeaten...

Read More

2 min read

ANSI X9.24-1-2017: Key Loading

The ANSI X9.24-1-2017 standard defines the requirements for the loading of key components or shares, and the loading of cleartext keys. The loading...

Read More
NIST PQC Finalists Update: It’s Over For The Rainbow

4 min read

NIST PQC Finalists Update: It’s Over For The Rainbow

Last month, one of the three NIST finalists for post-quantum signature schemes received its final nail in the coffin: Ward Beullens, a PostDoc at IBM...

Read More
An 'open' sign hanging in a shop's glass door

2 min read

UK eIDAS and EU eIDAS: Implications for Cross-Border & Digital Transactions

The eIDAS Regulation (No 910/2014) (EU eIDAS) came into force in 2016. It created a Europe-wide legal framework for electronic identification,...

Read More

5 min read

Crypto-Agility in the Advent of Post Quantum Computing

There is no question that quantum computing is coming. However, organizations need to question themselves as to whether they will be vulnerable to...

Read More
Understanding NIST’s Process on Post-Quantum Cryptography (PQC) Standardization

2 min read

Examining the NIST's Post-Quantum Cryptography Standardization Process

Most current public-key cryptography (asymmetric) algorithms are vulnerable to attack from large-scale quantum computers. In its efforts to...

Read More
What's_in_a_name_mathematics.jpg

2 min read

Q: What's in a Logo? A: Mathematics

Maybe you have wondered where our logo comes from and what it actually means. If you have, we hope the following will answer these questions. Just as...

Read More

2 min read

Why Emulator Detection is Essential for Mobile Banking and Payment App Security

Attacks on mobile banking and payment applications frequently begin with the use of an emulator for the mobile operating system, where the targeted...

Read More