CRYPTOMATHIC BLOG

 

3 min read

How eIDAS affects the USA

On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...

Read More

3 min read

Understanding non-repudiation of origin and non-repudiation of emission

This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...

Read More

3 min read

E-signatures in elections: The key to preventing voter fraud?

Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...

Read More
Person using their smartphone to write a digital signature on a blockchain-based app

4 min read

How Digital Signatures and Blockchains Can Work Together

Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...

Read More
ADES-STANDARD-FOR-MOBILE-and-DISTRIBUTED-ENVIRONMENTS.jpg

3 min read

Using The AdES Standard for Mobile and Distributed Environments

AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...

Read More

3 min read

The Role of Central Signing and Authentication in e-Government Security

Year after year, more stories surface about large scale data loss from e-government systems across the world.

Read More

2 min read

Expert’s Guidelines on how to document a Key Management System

This article discusses the importance and usage of documentation for a key management system within an organization.

Read More

5 min read

Non-Repudiation of Origin and Non-Repudiation of Emission for Banks

Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered...

Read More

4 min read

Cryptographic Key Management Policy: a layered approach

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...

Read More