Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

blog-autonomous-vehicles-and-blockchains
Blogbeitrag

Autonomous Vehicles and Blockchains

Fast forward to 2019 and autonomous vehicles (AVs) of all varieties: land, sea, and air are revolutionizing how people and goods are transported.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Blogbeitrag

Technical and Financial Advantages of Permissioned Blockchains in Banking

Permissioned networks are the ideal solution for banks in building their own blockchain. In this article, we will detail the technical advantages of banking blockchains and how these advantages lead to financial advantages, as well.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Blogbeitrag

Comparing Public (Permissionless) and Private (Permissioned) Blockchains - What is Best for Banking and Payment Services

Read how blockchains work, what are the differences between public and permissioned blockchain networks, and how banks currently position themselves in regards to these networks.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Blogbeitrag

The Key Role of HSMs in Secure Permissioned Blockchains for Banking and Payment Services

In many permissioned blockchain networks like Corda, notaries are dedicated nodes. They replace the role that miners play in other blockchains like the Bitcoin blockchain.
blog-technical-and-financial-advantages-of-permissioned-blockchains
Blogbeitrag

The Key Role of HSMs and Key Management in Secure Permissioned Blockchains for Banking and Payment Services - An Overview

Blockchains are ruled almost entirely by cryptographic mechanisms. These mechanisms mostly involve digital signatures & PKI, hashes, and key derivation.
blog-permissioned-blockchains-technology-and-security-aspects
Blogbeitrag

Permissioned Blockchains for Banking - Understanding the Technology and Security Aspects

The banking industry is currently rolling out several permissioned blockchain projects.
blog-why-are-permissioned-blockchains-a-great-fit-for-banking
Blogbeitrag

Why Are Permissioned Blockchains a Great Fit for Banking - A Case Study of the Corda Architecture

Permissioned blockchain networks are blockchain networks that are not public, e.g., they require users to apply for membership in order to gain access to them. Such blockchain networks use specific software to operate.
blog-why-is-the-design-of-notary-services-in-permissioned-blockchains
Blogbeitrag

Why is the Design of Notary Services in Permissioned Blockchains Key to Their Success in Banking?

What is a Notary Service in a Blockchain Network? A notary system is at the root of blockchain, where transactions need to be time-stamped by a trusted authority.
blog-using-blockchains-and-ecosystem-integrated-hsms
Blogbeitrag

Using Blockchains and Ecosystem-Integrated HSMs to achieve Compliant Digital Identity Security

In this article, we shall analyze the way blockchain technology can improve data protection and create a better, and smarter digital identity when used with HSMs.
blog-nists-hybrid-mode-approach-to-post-quantum-computing
Blogbeitrag

NIST's Hybrid Mode Approach to Post-Quantum Computing - why crypto agility is crucial

The importance of cryptography has acquired considerable prominence due to the requirement of security mechanisms such as confidentiality, integrity, authenticity, and non-repudiation in modern data communications.
Puzzle piece missing
Blogbeitrag

Why is the choice of the right HSM prerequisite for a crypto agile architecture

Organizations have to put serious consideration into the future of cryptography. This is why the choice of the right Hardware Security Module is a prerequisite for a crypto-agile architecture.
blog-state-of-symmetric-hash-algorithms-after-quantum-computing
Blogbeitrag

State of Symmetric & Hash Algorithms after Quantum Computing

The importance of cryptography is increasing. The formalization of quantum computing platforms poses serious threats to the cryptographic algorithms. Be informed about the omplications of quantum computing on the present cryptography.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Ihre Download-Sammlung ist leer. Besuchen Sie unseren Download-Bereich und wählen Sie aus Ressourcen wie Datenblättern, Whitepapers, Webinar-Aufzeichnungen und vielem mehr.

      Downloads
      0