Skip to the main content.

Cryptomathic

Enjoy expert insights into the latest innovations and talking points from the world of cryptography.

Digital signatures in mobile banking and payment processing

3 min read

Mobile Banking Enhanced with Digital Signatures

Over the past 8-10 years, we’ve witnessed a huge rise in the use and application of mobile banking. At first we could check our account balances and...

Read More

3 min read

eIDAS Impact on US: Key Considerations

On July 1st 2016, eIDAS was introduced in the EU to replace the almost 20 year old European Signatures Directive. The directive was originally built...

Read More

3 min read

Understanding non-repudiation of origin & non-repudiation of emission

This article sheds light on the two approaches to achieve non-repudiation of an electronic message: non-repudiation of emission and non-repudiation...

Read More

3 min read

E-signatures in elections: The key to preventing voter fraud?

Election season in the US is upon us - and with it, comes the typical questions of how to secure ballots and prevent voter fraud. In the US, UK, and...

Read More

4 min read

How Digital Signatures and Blockchains Can Work Together

Everywhere you turn in the security world, an interesting word keeps popping up: “Blockchain”. Just like the word “cloud”, this concept has taken...

Read More

3 min read

Using The AdES Standard for Mobile and Distributed Environments

AdES stands for Advanced Electronic Signature, which embraces a family of eIDAS-compliant standards for digital signatures including PAdES, CAdES and...

Read More

2 min read

Expert’s Guidelines on how to document a Key Management System

This article discusses the importance and usage of documentation for a key management system within an organization.

Read More

5 min read

Why Banks Need Non-Repudiation of Origin & Emission

Have you ever heard the kind of sweet and innocent voice saying, “I didn’t eat my brother’s ice cream”, while the kid’s mouth and t-shirt are covered...

Read More

4 min read

Layered Policies for Cryptographic Key Management

This article discusses the functions and use of hierarchical layers when establishing a cryptographic key management policy, and how the policy...

Read More