What type of authentication is best for GDPR compliance?
August 2017 by Tim Moses
Misuse and careless handling of personal data by some online companies have come to the attention of lawmakers, and the…
It’s tough to make predictions…
May 2017 by Tim Moses
Since Peter Shor published his eponymous algorithm for factoring composite numbers in 1994, cryptographic experts have speculated over whether and when the…
Carry Your Keys on a Chain
October 2016 by Tim Moses
Opinions vary widely concerning the significance of blockchain technology. Some commentators compare its potential impact on society to that of…
What’s Next for PKI?
March 2015 by Tim Moses
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a…
Patents, Key Escrow and the Elliptic Curve
February 2015 by Tim Moses
As part of Entrust’s ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a…
Public-Key Solves Half of the Key Distribution Problem
February 2015 by Tim Moses
As part of our ongoing celebration of the 20th Anniversary of Public Key Infrastructure (PKI), we’re looking back in a four-part…
In the Beginning—The Information Revolution
January 2015 by Tim Moses
As part of our ongoing celebration of the 20th Anniversary of Entrust’s Public Key Infrastructure (PKI), we’re looking back in a…
Dual-EC DRBG Concerns Hit Media Again
December 2013 by Tim Moses
NIST’s withdrawn special publication 800-90A is back in the news. This time, it’s due to an allegation carried by Reuters that…