Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

blog-how-to-select-an-hsm
Blogbeitrag

How to select an HSM vendor

As the choice of HSMs is dependent on the specific application it is used for, we make some general recommendations by providing a list of potential criteria to take into account, irrespective of what you intend to use it for.
digital avatar
Blogbeitrag

Understanding the Role of Hardware Security Modules in Digital Identities for Humans

eIDAS created standards for trust services to ensure that digital identities, including those for humans remain secure. Here we will examine the role that HSMs play in securing digital identities for humans.
somebody is clicking on the phone
Blogbeitrag

Understanding the Role of Hardware Security Modules in Public Key Infrastructure (PKI)

Public key infrastructure protects communications between users and website servers. The underlying Hardware Security Modules are the root of trust which protect PKI from being breached.
European Digital Identity Trust Framework
Blogbeitrag

The European Digital Identity Trust Framework & Qualified Trust Services

This article explains the Trust Framework and the ‘digital wallet’ requirement for remote eIDAS qualified electronic signatures, seals and qualified signature creation devices (QSCDs).
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Blogbeitrag

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Blogbeitrag

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blogbeitrag

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-1
Blogbeitrag

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 1: eIDAS

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blogbeitrag

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.
blog-eidas-advantages-of-qes-compared-to-aes-and-where-qes-is-vital
Blogbeitrag

eIDAS: The Advantages of QES as compared to AES

Know the main requirements that must be met to be complient for Advanced and Qualified Electronic Signatures with eIDAS electronic transactions in the European internal market.
blog-secure-transactions-with-eidas
Blogbeitrag

Secure Transactions with eIDAS

Under eIDAS, the EU aims to facilitate cross-border digital transactions and pave the way for a Digital Single Market. Qualified electronic signatures and seals play a decisive role with this goal. Read in our article how to benefit from eIDAS.
blog-how-high-trust-industries
Blogbeitrag

How high-trust industries are benefiting from e-signatures

Using an e-signature solution with a Hardware Security Module (HSM) ensures that cryptographic keys and digital identities are secured centrally .

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Ihre Download-Sammlung ist leer. Besuchen Sie unseren Download-Bereich und wählen Sie aus Ressourcen wie Datenblättern, Whitepapers, Webinar-Aufzeichnungen und vielem mehr.

      Downloads
      0