Welcome to our download area

Quantum computers might be able to break current crypto systems such as RSA or Diffie-Hellman one day. Migration to post-quantum cryptography is therefore a major task for the years to come. This document provides a generally understandable introduction.
Anyone interested in information security currently has to deal with post-quantum cryptography – i.e. cryptographic methods that withstand a quantum computer. This whitepaper provides a generally understandable introduction.

Operational Technology (OT) controls industrial processes in many critical sectors. However, many OT systems are not equipped to handle the current threat landscape. By ensuring that every device or module in an OT system operates with a secure identity, devices can interact with one another safely. Zero Touch Onboarding (ZTO) automates identity management in OT environments and is an approach that relies on standardized technology.

Operational Technology (OT) steuert industrielle Prozesse in zahlreichen sicherheitskritischen Umgebungen. Viele OT-Systeme sind jedoch nicht auf die aktuelle Bedrohungslage ausgelegt und daher anfällig für Cyberangriffe. Um dies zu ändern, muss jede Komponente als eigenständige Identität agieren, die mit einem Schlüsselpaar ausgestattet ist und mit anderen Komponenten sicher kommunizieren kann. Dazu ist ein ganzheitliches Identity Management notwendig. Zero Touch Onboarding (ZTO) automatisiert das Identitätsmanagement in OT-Umgebungen und sorgt dadurch für Effektivität und Sicherheit.

This white paper introduces Cooperative Intelligent Transportation Systems (C-ITS) and describes PKI solutions from Eviden Digital Identity that enable the secure operation of this technology.

Dieses Whitepaper stellt kooperative intelligente Verkehrssysteme (C-ITS) vor und beschreibt PKI-Lösungen von Eviden Digital Identity, die den sicheren Betrieb dieser Technologie ermöglichen.

Ce livre blanc présente les systèmes de transport intelligents coopératifs (C-ITS) et décrit les solutions PKI d’Eviden Digital Identity qui permettent le fonctionnement sécurisé de cette technologie.

Mindshare 2025 Presentations

Keynote

EUDI Wallet: Business model and business expectations

Roland Adrian, Verimi

Cryptography
Steal now, decrypt later: Protection through hybrid disk encryption
Fabian Albert (Rohde & Schwarz)
Citizen ID
Post-Quantum Cryptography in eMRTDs: Evaluating PAKE and PKI for travel documents
Nouri Alnahawi (Darmstadt University of Applied Sciences)

Open Track

Behind lock and key: an in-depth look at ransomware encryption
Jasper Bongertz, Melissa Eckardt (G-Data)
Sovereignty + Regulation
Codesigning: Protect your software, your partners, and your customers
Dan Butnaru (Eviden)
Sovereignty + Regulation
Navigating the balance between technological needs and regulatory constraints in the cloud: A case study
Corentin Cordier (Eviden)
Citizen ID
Physical versus digital security of eID documents
Fermín Vázquez, Ben Drisch (Eviden)
Citizen ID
eIDAS 2024: Will regulation preserve the sovereignty of digital identities in Europe?
Arno Fiedler (Nimbus)
Cryptography
Using secure elements to improve crypto-agility in Operational Technology

Tobias Frauenschläger (OTH Regensburg)

Sovereignty + Regulation
European C-ITS-PKI – theory and application
Herbert Füreder (Yunex)
Sovereignty + Regulation
Eviden solutions at customers from medium-sized companies to large corporations – two case studies
Sven Hoge (IDpendant GmbH)
Cryptography
Migrating to quantum safe
Dr. Efstathia Katsigianni (IBM)
Open Track
GenAI is your next gen customer success manager — The IAM caseCancelled
David Leporini (Eviden)
Sovereignty + Regulation
Is Virtual Smart Card (VSC) the better smart card?
Atefeh Mokallahi (Eviden)
Cryptography
Status and struggles of migration towards post-quantum cryptography
Lea Nagler (BSI)
Cryptography
PQC: A management perspective
Kim Nguyen (Bundesdruckerei)
Open Track
Confdential data-souvereign cloud using modern cryptography
David Niehues (Utilacy)
Open Track
Enabling security champions: Heroes of secure software development
Jens Opdenbusch
PhD Student in Human Centred Security at CASA
Sovereignty + Regulation
VS cloud requirements and cryptography
Matthias Peter (BSI)
Open Track
Too good to be true: The impact of inaccurate cybersecurity marketing
Felix Reichmann (Ruhr Universität Bochum)
Cryptography
Crypto agility for PQC credentials – how to upgrade eID documents and tokens to post quantum capability, and how to update them in the field?
Mario Stoltz (NXP)
Citizen ID
APTITUDE – Shaping citizen-centric eID use cases with the European Digital Identity Wallet
Florent Tournois (ANTS)
Citizen ID
From good to great: Leveraging FIDO2 and PKI for a combined solution
Nicole Wagner (Infineon)
Citizen ID
Conversion of existing national ID systems to a modern solution
Tim Wilbrink (Mühlbauer)

Mindshare 2024 Presentations

Presentation

Welcome to the Jungle
Simon Ulmer, Eviden
Citizen ID
Citizen ID Blunders
Ben Drisch & Marco Smeja, Eviden
Sovereignty + Regulation
AI regulation: Innovation Killer or Trigger?
Marina Bojarski, Eviden
Cryptography
Migration to Post-Quantum Cryptography
Klaus Schmeh & Simon Ulmer, Eviden
Cryptography
Making Hardware Security Modules Quantum-Ready

Antoine Schweitzer-Chaput, Eviden

Sovereignty + Regulation
NIS2-Compliant Cryptography and Encryption – View of the Client’s Advisor and Auditor
Sławek Pijanowski, Eviden
Sovereignty + Regulation
How Businesses can Tackle Digital Sovereignty Concerns during their Digital Transformation Journey
Pierre Brun-Murol, Eviden
Cryptography
Securing the Digital Future: Securing the Digital Future:
Anastazija Živković
Sovereignty + Regulation
The Cyber Resilience Act: A Paradigm Shift in the EU Market
Detlef Houdeau, Infineon
Citizen ID
Citizen ID with IDaaS for NBB
Edin Haznadar, Eviden
Sovereignty + Regulation
Digital Regulation in the EU: A Critical
Marina Bojarski, Eviden
Citizen ID
Case Study: Replacing an eID Card System with Smooth Document Upgrades, Middleware and Personalization Solution
Tim Wilbrink, Mühlbauer

Presentation

Is Virtual Smart Card (VSC) the Better Smart Card?
Atefeh Mokallahi, Eviden

Presentation

The Vital Role of Randomness in Cybersecurity (and What Happens When It Fails)
Dr. Annika Möslein, Quantum Dice
Open Track
Managing the Human Risk
Anne Lahner, Strong Minds
Open Track
How to Secure your Confidential Communication and Important Assets Using Multi Factor Authentication (MFA)
Ralf Knöringer & Vahid Asadi, Eviden
Open Track
How Eviden Technology Protected the Olympic Games in Paris
Benoît Delpierre, Eviden
Open Track
How can Generative AI help Identity & Access Management?
David Leporini, Eviden
Open Track
Enhancing IT Security through Transparency: The Role of Software Bills of Materials
Felix Reichmann, Ruhr-Universität Bochum

Do you have a question? Contact us now!

Do you have any questions about one of our products or solutions? Don't hesitate to contact us. We'll give you expert advice.