CRYPTOMATHIC BLOG

 

Quantum-Cryptography

5 min read

Quantum Computing and its Impact on Cryptography

“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...

Read More

4 min read

The Use of Random Number Generators in Cryptography

In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...

Read More

7 min read

Exploring the Lifecycle of a Cryptographic Key

This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More

3 min read

5 ways eIDAS is Boosting the Digitization of Trade

Retail banking has been unrecognizably changed by digitization. Everything from payments to basic credit products can now be availed digitally....

Read More

2 min read

Distributed vs Centralized Key Management

The need for mitigating risk with an appropriate key management system (KMS) is critical to the success of any organization that shares sensitive...

Read More

3 min read

How Third Party Testing Can Improve Key Management System Security

For identifying, detecting, and eliminating flaws in a key management system, independent third-party testing is required (KMS). Third-party testing...

Read More
eIDAS-opens-international-trade-to-SMEs

3 min read

eIDAS – Breaking the SME Barrier

In a recent article, we looked at how eIDAS can help SMEs grow and prosper. SMEs are undoubtedly the lifeblood of any economy which means that EU...

Read More
Close up of a bright blue eye, decorated with mascara and eye shadow, representing the concept of what you see is what you sign

3 min read

What You See Is What You Sign (WYSIWYS) – a Step-by-step Breakdown

What You See Is What You Sign (WYSIWYS) refers to the part of any signature process, where you read a document you intend to sign, and ensure that...

Read More
Key-management-explained

4 min read

The benefits of an automated and centralized key management system

The aim of this article is inform you on how to implement proper key management and to answer 3 important questions regarding centralized and...

Read More