Policy Papers

Cryptographic Constraints for Smart Security Devices Applications

02 June 2008

The goal of this document is to provide an overview on the cryptographic mechanisms specified today in the main smart security devices applications to compare with the recommendation of the different governmental institutions, and to provide some recommendations to the Smart Security Industry about how to move on.

White Paper on Cryptographic Constraints