CRYPTOMATHIC BLOG

 

EUDI

2 min read

EUDI Wallets & Trust Services: The Future of Digital Identity and Signatures in eIDAS 2

In our Part 1 blog, we explored how eIDAS 2.0 marks a transformative shift for Trust Service Providers (TSPs) across Europe. In this follow-up, we...

Read More

4 min read

The EUDI Wallet Certification Process: Key Challenges

As the European Union solidifies the framework for the EUDI (European Digital Identity) wallet, the certification process outlined in the...

Read More

2 min read

Hard Truths About Hardware: EUDI Wallet Needs More Than Secure Chips

Mobile phones are increasingly vulnerable to hacking and fraud, presenting significant challenges for securing sensitive applications like the EUDI...

Read More

2 min read

Reviewing the EUDI Wallet Reference Implementation Code

The EUDI wallet reference implementation serves as a practical guide for developers to create secure digital identity management solutions based on...

Read More

3 min read

Key Vulnerabilities of the EUDI Wallet Solution Reference Architecture

The EUDI (European Digital Identity) wallet solution reference architecture (ARF) is designed to provide a secure framework for managing digital...

Read More

1 min read

Belgium's Digital ID Wallet Secured by Cryptomathic

Cryptomathic’s Mobile App Security Core (MASC) delivers the highest levels of security, protection and privacy for citizens using the app

Read More

4 min read

Using EUDI Wallets for Secure Digital Payments

The European Digital Identity Wallet (EUDI Wallet) is at the forefront of the European Commission's eIDAS initiative to establish a secure and...

Read More

6 min read

Outline of the Players in the EUDI Wallet Ecosystem

The European Digital Identity (EUDI) Wallet aims to offer digital wallets to all EU citizens and businesses for identification purposes and document...

Read More

5 min read

How Assurance Protocols Enhance Mobile App Security

Mobile apps and mobile software components are rarely stand-alone as they frequently perform their most important operations on various backend...

Read More