Panos Kampanakis's Articles
-
Security
Collaborating with NCSU to deliver certificate validation and crypto validation reusable implementations.
Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years.
Read More -
Security
Towards Backward-Compatible Post-Quantum Certificate Authentication
Quantum computers would pose a threat to PKI algorithms and systems as we know today.
Read More -
Security
Collaborating with NCSU to promote lightweight crypto validation and assessment
Cryptography is very important in today’s world. Improper or maliciously altered crypto implementations have been a concern for the industry in recent years. To alleviate the risk, Cisco has been
Read More -
Security
Taking certificate enrollment to the next level
Bouncy Castle adds support for EST Note: We would especially like to thank the Crypto Workshop team for their contributions to this post and the fruitful collaboration. Recently Crypto Workshop
Read More -
Security
Lessons Learned from Testing Cisco EST Implementations with Entrust Datacard
[Note: We would especially like to thank the Entrust Datacard team for their contributions to this post and the fruitful collaboration. More info at Entrust Datacard’s Digital DNA blog series and
Read More -
Security
FIPS and Deterministic ECDSA: Achieving robust security and conformance
Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed
Read More -
Security
Lessons Learned from Testing Cisco EST Implementations for Interoperability with DigiCert
Thanks to DigiCert for their contributions co-authoring this post. Interoperability for technology solutions is a top priority—standards used in these solutions become irrelevant when products operate in a silo. Thus,
Read More -
Security
ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography
Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have
Read More -
Security
Quantum-resistant signatures: an update
Quantum-resistant crypto Recently there has been great media attention on Quantum Computers (QC) and their potential impact on current cryptography standards. We blogged about it in 2015. All of this
Read More -
Security
Step-by-Step Setup of ELK for NetFlow Analytics
Contents Intro Java Elasticsearch Logstash Kibana Intro The ELK stack is a set of analytics tools. Its initials represent Elasticsearch, Logstash and Kibana. Elasticsearch is a flexible
Read More