Blog

ブログ

Press releases

特定のトピックのブログ投稿を検索するには、最も人気のあるキーワードのいずれかをクリックします。

blog-crypto-agility
ブログ記事

Crypto agility - How to determine your timeline for post-quantum preparation

There is a significant uncertainty when it comes to the impact of quantum computing on modern cryptography. Michele Mosca has offered a theorem that may be the key to successfully determining your path to post-quantum preparation.
blog-how-entrust-datacard-pioneers-the-road-to-post-quantum-with-utimaco
ブログ記事

How Entrust Datacard pioneers the road to post-quantum with Utimaco - in spite of all uncertainties

Sandy Carielli faces all the unanswered questions, to advice Entrust Datacard's partners and customers on how to move forward in the context of post-quantum cryptography.
blog-a-new-era-for-e-signatures
ブログ記事

A new era for e-signatures – how eIDAS is shaping the future of high-trust signing

E-signatures provide a fast, secure, efficient and cost-effective alternative to paper signing and the eIDAS regulation ensures legal certainty across the EU with its requirements for Basic, Advanced and Qualified e-signatures.
Payment HSM as a service
ブログ記事

NIST shortlisted 26 algorithms for focal post-quantum research

Since the development of quantum computing, some cryptographic algorithms have been compromised. Read here about current threats to crypto applications and how you can mitigate the security risks.
blog-how-samsung-prepares-devices
ブログ記事

How Samsung prepares devices sold today for a life in the post-quantum era

In this video blog, Madjid Nakhjiri, Senior Principal Security Architect at the Samsung Strategy and Innovation Center, describes his company’s strategy to develop products today which are prepared for the post quantum era.
blog-crypto-agile-hsms-by-utimaco
ブログ記事

Crypto-agile HSMs by Utimaco used in research for post-quantum cryptography

The need for crypto agility becomes more important. HSMs play a critical role in crypto agility and safeguarding digital keys as they provide the secure environment for executing the cryptographic algorithms to generate these keys.
blog-michele-mosca-quantum-computing
ブログ記事

Michele Mosca: Quantum computing will decimate the security infrastructure of the digital economy (video)

Michele Mosca explains why researchers all around the globe are ambitiously working on a new generation of cryptographic infrastructure and algorithms to withstand the quantum-enforced new generation of attack models.
blog-is-blockchain-fit-for-the-post-quantum-future
ブログ記事

Is blockchain fit for the post-quantum future?

Cryptography is one of the cornerstones of all blockchain infrastructures. A major advantage of blockchain is that its cryptography manges it virtually untamperable, with changes in the crypto being virtually impossible.
blog-qualified-signature-creation-devices-qscd
ブログ記事

Qualified Signature Creation Devices (QSCD) under eIDAS – The example of the Bank-Verlag Signature Activation Module (SAM)

This article looks into how CC-certified and eIDAS-compliant Utimaco HSM integrates with the Bank-Verlag Signature Activation Module (SAM) and helps Bank-Verlag become a TSP.
blog-utimaco-applied-crypto-symposium
ブログ記事

Utimaco Applied Crypto Symposium in the US 2018

Quantum computers will revolutionize many industries and will be powerful enough to break all commonly used public key cryptographic algorithms.
what is crypto agility
ブログ記事

What is crypto-agility and how to achieve it?

Crypto-agility can be elaborated as the ability and aptitude of a system to promptly shift from the existing cryptographic algorithms and primitives to the newer and updated ones.
blog-eidas-regulation
ブログ記事

eIDAS regulation: do not make the wrong choice when you are picking your HSM

Advances in financial technology are transforming banking as we know it and this spark innovation is changing the approach of this historically traditional sector.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.

      Downloads
      0