Featured Blog Post
Sinisha Patkovic
Oct 20, 2021
Why is cryptography suddenly becoming such a big topic? Let’s face it. Cryptography has been at the core of every secure transaction since the dawn of the Internet — unassuming and low profile, it has been working its security magic all the way from hardware to apps. Public key cryptography, to be more exact, ensures the authentication and identity of all transactions and participants in the digital world.
Sinisha Patkovic
Oct 20, 2021
Why is cryptography suddenly becoming such a big topic? Let’s face it. Cryptography has been at the core of every secure transaction since the dawn of the Internet — unassuming and low profile, it has…
Philip Lafrance
Feb 08, 2021
What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography?…
Paul Lucier
Jul 30, 2020
On July 22nd National Institute of Standards and Technology (NIST) announced that they have entered the ‘selection’ round in the process of standardizing post-quantum cryptography. If you’re reading this,…
Victoria de Quehen
Jul 27, 2018
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…