Blog
Featured Blog Post
Tuesday, October 7, 2025
TMS FNC UI Pack 6.9 BETA Intro Working with large datasets can be challenging. When your grid contains thousands or even millions of rows, displaying them all at once isn't just impracticalit can bring your application to a cr...
Blog Posts:
Latest arrow_downward | Views
Friday, September 19, 2025
The TMS team has released version 5.0.9.5 of the Cryptography Pack (TMSCP) today. This release is a new milestone for the library as it is the first major release for a full Delphi version. BackgroundTMSCP was initially released end of ...
Saturday, August 30, 2025
The use of compressed files is mainstream and many format-algorithm combinations exist to reduce the amount of data stored on computer or exchanged over the Internet.One of the most used, and historical, compressio...
Friday, July 25, 2025
In previous blog posts on crypto, we discussed the signing of documents with tokens and proposed a simple tool to check the content of a PKCS#11 token. We also introduced digital signatures, X509, ASN.1, CMS, PDF and ETSI standards for signa...
Thursday, November 14, 2024
Version 5.0 beta of the TMS Cryptography Pack is available for users with an active license on their "My Products" page after login on our website. This is the first 'full Delphi' version of the pack as the core cryptographic algorithms w...
Friday, March 29, 2024
In a previous blog post, we discussed the signing of documents with tokens and proposed a simple tool to check the content of a PKCS#11 token. We also introduced digital signatures, X509, ASN.1, CMS, PDF and ETSI standards for signatures....
Tuesday, February 20, 2024
TMS Cryptography Pack, or TMSCP in short, contains a set of cryptographic algorithms and specific classes to address data encryption, hashing, signature and authentication. This post provides an overview of cryptographic signatures...
Friday, October 2, 2020
TX509Certificate is a component of TMS Cryptography Pack to use X509 certificates. With it, we can sign certificate signing request (CSR) or use it in XAdES, CAdES or PAdES to sign or verify documents. We can generate self-signed certificates, impor...
Thursday, March 2, 2017
SHA-1 is a hash function developed by NSA and standardized by NIST in 1994. It is implemented in many Internet protocols using cryptographic primitives, such as TLS. Last week the CWI Institute in Amsterdam and Google announced the first practical co...
Thursday, November 10, 2016
What's wrong with the KIS principle to store application settings in an INI file? The risk that someone is tampering with the INI file is an often heard reason for not using them. Not being able to store private or secret information another one. Bot...
Monday, June 20, 2016
In the past couple of months, TMS software formed a partnership with the company Cyberens with the goal to jointly develop cryptography solutions for Delphi, C++, C users. With this partnership, Bernard Roussely and Marion Candau from Cyberens bring ...