CRYPTOMATHIC BLOG

 

3 min read

EU AWS Hosting: Data Residency, Regionality, Digital Sovereignty, GDPR

This article sheds light on the intersection of legal and technical aspects when hosting data on AWS as a European company.

Read More
Explaining the Java ECDSA Critical Vulnerability

3 min read

Explaining the Java ECDSA Critical Vulnerability

On April 19, 2022, information about a severe vulnerability in recent versions of Java shook up the security community.

Read More
PCI PIN Requirements for Key Blocks in the Payment Card Industry - FAQs

3 min read

Key blocks and PCI PIN requirements: FAQs

This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.

Read More

3 min read

What is a Secure Signature Creation Device? Types and Requirements

As defined by Regulation (EU) No 910/2014 (eIDAS), which took effect on 1 July 2016, an electronic signature creation device is software or hardware...

Read More
Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

5 min read

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Today's businesses rely heavily on cryptography to authenticate people and processes, secure communications, and safeguard critical data.

Read More

4 min read

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...

Read More

3 min read

Digital vs Wet Signatures: The Impact of Forgery On House Buying

Mortgage fraud is a serious crime. Once executed and signed, a mortgage deed is a legally binding contract. The responsibility of trying to prove...

Read More

5 min read

Centralized Authentication and Signing for E-Government

Achieve Non-Repudiation of Origin (NRO) and Non-Repudiation of Emission (NRE)

Read More
Classification-cryptpgrapjic-keys

5 min read

Classification of Cryptographic Keys

This article is meant to be an introduction to the different types of cryptographic keys that are used to protect digital applications in encryption...

Read More