CRYPTOMATHIC BLOG

 

White smartphone and a black tablet lying on an open laptop, being used to research the digital Signature Activation Protocol

3 min read

Introducing the Digital Signature Activation Protocol for Remote Server Signing

This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...

Read More

4 min read

Tokenization and Securing Mobile Payments Apps

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. In 2017,...

Read More
Horses galloping across a field, rendered in black and white representing the speed and reliability of remote electronic signature services

4 min read

Remote Electronic Signatures: How to Improve Performance and Scalability

National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...

Read More
Understanding the IBM CCA key format and the importance of banking-grade key management

3 min read

Understanding IBM CCA & the Importance of Banking-grade Key Management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...

Read More
The Conveyancing Association & Qualified Electronic Signatures

2 min read

UK Survey Reveals the Need for eIDAS Qualified Electronic Signatures

The Conveyancing Association (CA) in the UK has revealed the findings of its 2022 Lender Survey, which it strongly believes will assist in...

Read More

2 min read

NIST Post-Quantum Cryptography Standardization: SIKE Bites the Dust

Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in...

Read More

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Usage of Encryption to Secure eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More