CRYPTOMATHIC BLOG

 

A Brief Overview of the Challenges Involved in Key Management for EMV Personalization : The Main Actors of EMV Personalization

3 min read

Key Management Challenges for EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...

Read More
Secure Connectivity for Mobile Banking and Payment Apps: Strong Authentication

4 min read

Why Mobile Banking and Payment Apps Need Strong Authentication

Here we provide a short overview of why strong authentication is seriously needed to provide security for mobile banking and payment applications.

Read More
smes-and-eIDAS

3 min read

How eIDAS can help SMEs grow and prosper

Small and Medium Enterprises (SMEs) form the backbone of any economy. In the European Union (EU), SMEs represent 99% of all businesses and account...

Read More
An Overview of the Different Key Block Formats

2 min read

An Overview of the Different Key Block Formats

A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...

Read More
Payment & Banking: An Introduction to z/OS and the IBM Common Cryptographic Architecture

4 min read

An Introduction to z/OS and the IBM Common Cryptographic Architecture

IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...

Read More
White smartphone and a black tablet lying on an open laptop, being used to research the digital Signature Activation Protocol

3 min read

Introducing the Digital Signature Activation Protocol for Remote Server Signing

This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...

Read More

4 min read

Tokenization and Securing Mobile Payments Apps

The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. In 2017,...

Read More
Horses galloping across a field, rendered in black and white representing the speed and reliability of remote electronic signature services

4 min read

Remote Electronic Signatures: How to Improve Performance and Scalability

National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...

Read More
Understanding the IBM CCA key format and the importance of banking-grade key management

3 min read

Understanding IBM CCA & the Importance of Banking-grade Key Management

The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...

Read More