CRYPTOMATHIC BLOG

 

5 min read

Technologies Behind Tokenization For Card Payments And PCI-DSS

The EMV consortium released several standards detailing how “network” tokenization should be handled. There is now a general consensus within the...

Read More

6 min read

The Advantages & Challenges of EMV Tokenization

EMV is short for EUROPAY-VISA-MASTERCARD. This term is used to refer to standards that have been designed to improve the security of credit and debit...

Read More
key-meta-data

2 min read

Why Key Metadata Is Critical and How to Manage It

This article explains the concept of meta-data in the context of cryptographic keys, explaining why it is used and the necessity to manage it well.

Read More
What is Banking-Grade Tokenization According to PCI DSS

4 min read

Banking-Grade Tokenization: PCI DSS Standards Explained

The concept of a token has been used in the digital world for almost 50 years to separate and protect real data elements from exposure. In recent...

Read More
Toy robot writing its signature on a paper notepad, representing the concept of digital signatures and PKCS 7

4 min read

A Beginner’s Guide to PKCS #7 and Digital Signatures

In many parts of the world, including the European Union and the United States, businesses have adopted digital signing as a way to implement...

Read More

4 min read

Remote QES Services from Trust Service Providers

The following content is an introduction to trust services and remote Qualified Electronic Signatures (QES) according to the eIDAS regulation and...

Read More

3 min read

An Introduction to PCI DSS: Securing Payment Data

The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for information that protects against credit card fraud and many...

Read More

5 min read

Understanding the Concepts of Cryptographic Key Management

This article looks at the concept of cryptographic key management – what it is, why it’s important, and how an electronic key management system...

Read More

5 min read

Protecting Against Digital Signature Validation Attacks

Preserving the integrity of an e-signature is crucial to protecting the attached messages or documents. In this article, we delve deeper into the...

Read More