CRYPTOMATHIC BLOG

 

Strong_Cryptography_requirements_for_EMV_cards_compliant_to_PCI_DSS

3 min read

An Introduction to PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information that protects against credit card fraud and many...

Read More
key-management-dare-to-ask-cryptomathic

5 min read

Understanding Cryptographic Key Management Concepts

This article looks at the concept of cryptographic key management – what it is, why it’s important, and how an electronic key management system...

Read More
e-signature-attacks

5 min read

eIDAS and eSignature Validation Attacks: How to Protect Yourself

Ensuring that the integrity of an e-signature remains intact is crucial to protecting its attached messages or documents. This article will explain...

Read More
Quantum-Cryptography

5 min read

Quantum Computing and its Impact on Cryptography

“Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at very...

Read More
Random-Number-Generation-in-Cryptography

4 min read

The Use of Random Number Generators in Cryptography

In this article, we examine the use of random number generators (RNGs) in cryptography, specifically in relation to hardware security modules (HSMs)...

Read More
Taking Stock – How is eIDAS stacking up for SMEs? (Part 1)

3 min read

Taking Stock – How is eIDAS stacking up for SMEs? (Part 1)

SMEs continue to be a key focus area for European agencies to fuel growth and enhance economic freedom for their citizens. Various policy tools and...

Read More
eIDAS and the eSignature Standards Driving Digitization in the EU

4 min read

eIDAS and the eSignature Standards Driving Digitization in the EU

The world is slowly but surely moving away from its centuries-old obsession with paper. With the very real threat of man-made climate change, it is a...

Read More
Exploring the Lifecycle of a Cryptographic Key

7 min read

Exploring the Lifecycle of a Cryptographic Key

This article discusses the main phases involved in the lifecycle of a cryptographic key, and how the operational lifetime of a key and its strength...

Read More
luxtrust-cryptomathic

2 min read

Remote Signing Pioneers LuxTrust and Cryptomathic Deepen Partnership

More than a decade ago, Cryptomathic and LuxTrust, then a newly formed trust service provider (TSP), decided to invest in the development of...

Read More