Understanding OATH TOTP authenticationsThis article explains how OATH TOTP authentications work by describing the principles and intuitions behind them.Nov 20, 2020Nov 20, 2020
Understanding OATH HOTP authenticationsThis acticle explains how OATH HOTP authentications work by describing the principles and intuitions behind them.Nov 8, 2020Nov 8, 2020
Understanding RSA digital signaturesThis article explains how RSA digital signatures work by describing the principles and intuitions behind them.Oct 11, 2020Oct 11, 2020
Make your posts (on LinkedIn, Medium…) sexier with emojisYou want to make your posts (on LinkedIn, Medium…) sexier and more attractive. You can use emojis, it is really easy.Sep 12, 2020Sep 12, 2020
Architecting a Cloud Signature Consortium (CSC) signature solutionLast year, I built a cloud-based signature solution, compatible with Cloud Signature Consortium (CSC), using FIDO authentication.Sep 2, 20201Sep 2, 20201