The "new economy" is the catch-all phrase encompassing all new mostly service based industries, especially the ones delivered on a digital platform.Read more
This article outlines cryptographic operations and best practices you should follow to make your applications or systems secure.
Cryptographic algorithms can be categorized into three classes: Hash functions, Symmetric and Asymmetric algorithms. This article sheds light on their differences, purpose and main fields of application.Read more
This article discusses why cryptographically protected data exchange between the EU and Russia (and other countries) is still difficult to implement.Read more