3 min read
Key Management Challenges for EMV Personalization
The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...
3 min read
The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in...
4 min read
Here we provide a short overview of why strong authentication is seriously needed to provide security for mobile banking and payment applications.
3 min read
Small and Medium Enterprises (SMEs) form the backbone of any economy. In the European Union (EU), SMEs represent 99% of all businesses and account...
2 min read
A key block is a unique piece of cryptography that is used to protect cryptographic keys while they are being sent over networks that might not be...
4 min read
IBM’s mainframe computers have been a rock-steady part of banks’ security infrastructure for many years. Originating from the local data-center...
3 min read
This article explains the digital Signature Activation Protocol (SAP) in the context of eIDAS-compliant central signing. It sheds light on its...
4 min read
The use of mobile payments is expected to continue to rise and become the second most popular payment method after debit cards by 2022. In 2017,...
4 min read
National digital signature schemes that utilize remote electronic signature technology can achieve very high usage rates, whereas Trust Service...
3 min read
The IBM Common Cryptographic Architecture (CCA) is a cryptographic platform providing several functions of special interest for securing financial...