Blog

Featured Blog Post

Wednesday, May 29, 2024

Get ready to mark your calendars because the TMS Training Days are back, and this year, we're heading to the vibrant city of Lille, France, on September 26th and 27th. Set aga...

Blog Posts:  Latest arrow_downward | Views

PREVIOUS NEXT

Friday, March 29, 2024

In a previous blog post, we discussed the signing of documents with tokens and proposed a simple tool to check the content of a PKCS#11 token. We also introduced digital signatures, X509, ASN.1, CMS, PDF and ETSI standards for signatures....


Tuesday, February 20, 2024

TMS Cryptography Pack, or TMSCP in short, contains a set of cryptographic algorithms and specific classes to address data encryption, hashing, signature and authentication. This post provides an overview of cryptographic signatures...


Friday, October 2, 2020

TX509Certificate is a component of TMS Cryptography Pack to use X509 certificates. With it, we can sign certificate signing request (CSR) or use it in XAdES, CAdES or PAdES to sign or verify documents. We can generate self-signed certificates, impor...


Thursday, March 2, 2017

SHA-1 is a hash function developed by NSA and standardized by NIST in 1994. It is implemented in many Internet protocols using cryptographic primitives, such as TLS. Last week the CWI Institute in Amsterdam and Google announced the first practical co...


Thursday, November 10, 2016

What's wrong with the KIS principle to store application settings in an INI file? The risk that someone is tampering with the INI file is an often heard reason for not using them. Not being able to store private or secret information another one. Bot...


Monday, June 20, 2016

In the past couple of months, TMS software formed a partnership with the company Cyberens with the goal to jointly develop cryptography solutions for Delphi, C++, C users. With this partnership, Bernard Roussely and Marion Candau from Cyberens bring ...


PREVIOUS NEXT