CRYPTOMATHIC BLOG

 

A detailed diagram showing the various steps involved in mobile payment tokenization

4 min read

How Tokenization Secures Mobile Payment Applications

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. Analysts...

Read More
Horses galloping across a field, rendered in black and white representing the speed and reliability of remote electronic signature services

4 min read

Improving Performance & Scalability with Remote Electronic Signatures

National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...

Read More

3 min read

IBM CCA & the Importance of Banking-grade Key Management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...

Read More

2 min read

NIST Post-Quantum Cryptography: SIKE’s Standardization Failure

Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in...

Read More

3 min read

Advantages of Centralized Key Management

Traditionally, end-to-end lifecycle key management was achieved through inefficient paper-based procedures and highly resource intensive tasks...

Read More

3 min read

7 Tips for Correct Encryption Usage in eGovernment Processes

Encryption has become the most essential part of securing data online. The biggest headache to the Cybersecurity industry is a data breach. The last...

Read More

3 min read

How to Deploy and Manage Cryptography in a Project the Right Way

With the ever increasing number of online services and electronic transactions, business owners are becoming ever more dependent on the use...

Read More
What You See Is What You Timestamp – A Cost-Effective Acceptance Method to Guarantee Non-repudiation document acceptance for Legal Archiving Purposes

2 min read

What You See is What You Timestamp: Alternative to QES

In this article, we proposeWhat-You-See-Is-What-You-Timestamp (WYSIWYT) as an attractive alternative to Qualified Electronic Signatures, for certain...

Read More
Person in an apron clicking a green arrow on a large touchscreen display

5 min read

Electronic Signatures: Which Industries Must Use E-Signatures?

Certain industries have a duty to protect confidential information, as well as a requirement for authentication - proving that a document was sent by...

Read More