4 min read
Differences Between Hash Functions & Algorithms
Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...
Enjoy expert insights into the latest innovations and talking points from the world of cryptography.
4 min read
Cryptographic algorithms can be categorized into three classes: hash functions, symmetric, and asymmetric algorithms. This article sheds light on...
5 min read
This article introduces and classifies cryptographic key types and crypto-periods as suggested by NIST, based on proven best practices for key...
3 min read
Financial institutions and solution providers are busy implementing the requirements of Strong Customer Authentication (SCA) under the Revised...
6 min read
This article discusses the benefits eIDs provide for both banks and customers in streamlining cross-border transactions and what is required under...
2 min read
This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.
4 min read
The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...
4 min read
In many parts of the world, including the European Union and the United States, businesses have adopted digital signing as a way to implement...
4 min read
The following content is an introduction to trust services and remote Qualified Electronic Signatures (QES) according to the eIDAS regulation and...
3 min read
The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information that protects against credit card fraud and many...