4 min read
Cryptographic Key Management Policy: a layered approach
This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...
4 min read
This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...
2 min read
On June 11, 2016, Whitfield Diffie, a Technical Advisory Board member at Cryptomathic, and Martin E. Hellman, Professor Emeritus of Electrical...
2 min read
Under the eIDAS Regulation (EU) No 910/2014, a qualified certificate for electronic signature refers to “a certificate for electronic signatures,...
2 min read
Under Regulation (EU) No 910/2014 (eIDAS), a Trust Service Provider (TSP) is defined as “a natural or a legal person who provides one or more trust...
3 min read
When an electronic signature is created, it must be associated to the data that it is being used to secure. This is accomplished by creating a data...
4 min read
On December 19, 2003, ZertES, the Swiss Federal law regarding the use of certification services with electronic signatures was approved into law.
3 min read
This article explains what an electronic signature policy is from the perspective of a CISO or other person required to maintain information security.
4 min read
The term XAdES stands for XML Advanced Electronic Signatures, which specifies a set of extensions that are used with the W3C recommendation for XML...
3 min read
The term CAdES stands for CMS Advanced Electronic Signatures. The Cryptographic Message Syntax (CMS) provides a framework for digitally signed...