Welcome to our download area
Quantum computers might be able to break current crypto systems such as RSA or Diffie-Hellman one day. Migration to post-quantum cryptography is therefore a major task for the years to come. This document provides a generally understandable introduction.
Anyone interested in information security currently has to deal with post-quantum cryptography – i.e. cryptographic methods that withstand a quantum computer. This whitepaper provides a generally understandable introduction.
Mindshare 2024 Presentations
Sovereignty + Regulation
NIS2-Compliant Cryptography and Encryption – View of the Client’s Advisor and Auditor
Sławek Pijanowski, Eviden
Sovereignty + Regulation
How Businesses can Tackle Digital Sovereignty Concerns during their Digital Transformation Journey
Pierre Brun-Murol, Eviden
Cryptography
Securing the Digital Future: Securing the Digital Future:
Anastazija Živković
Sovereignty + Regulation
The Cyber Resilience Act: A Paradigm Shift in the EU Market
Detlef Houdeau, Infineon
Citizen ID
Case Study: Replacing an eID Card System with Smooth Document Upgrades, Middleware and Personalization Solution
Tim Wilbrink, Mühlbauer
Presentation
The Vital Role of Randomness in Cybersecurity (and What Happens When It Fails)
Dr. Annika Möslein, Quantum Dice
Open Track
How to Secure your Confidential Communication and Important Assets Using Multi Factor Authentication (MFA)
Ralf Knöringer & Vahid Asadi, Eviden
Do you have a question? Contact us now!
Do you have any questions about one of our products or solutions? Don't hesitate to contact us. We'll give you expert advice.