Asymmetric crypto algorithm for encryption with hardware token
Our product stores voucher data in a database.
These voucher data can be retrieved with our app to display a voucher that can be used for payments.
Obviously, these voucher data are extremely sensitive because who ever gets access to them … Continue reading Asymmetric crypto algorithm for encryption with hardware token