<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://arthurvandermerwe.com/about/</loc><image:image><image:loc>https://arthurvandermerwe.com/wp-content/uploads/2018/09/arthur.png</image:loc><image:title>Arthur</image:title></image:image><image:image><image:loc>https://arthurvandermerwe.com/wp-content/uploads/2014/06/1422526_10151844547994023_2000798969_n.jpg</image:loc><image:title>1422526_10151844547994023_2000798969_n</image:title></image:image><lastmod>2025-10-09T04:00:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://arthurvandermerwe.com/2020/02/16/a-brief-comparison-of-as2805-and-key-blocks/</loc><lastmod>2023-09-22T16:37:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2020/01/19/what-is-the-random-oracle-model-and-why-should-you-care-part-5-a-few-thoughts-on-cryptographic-engineering/</loc><lastmod>2020-01-18T22:56:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2019/02/21/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function-a-few-thoughts-on-cryptographic-engineering/</loc><lastmod>2019-02-21T03:56:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2015/07/31/the-refund-vulnerability-of-as2805-and-eftpos/</loc><lastmod>2025-03-27T23:06:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2016/07/23/signature-and-certificate-based-key-injection-for-atm/</loc><lastmod>2020-05-27T22:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2017/02/10/mutual-authentication-using-certificates/</loc><lastmod>2018-09-25T12:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2017/12/29/from-bi-linear-maps-to-searchable-encryption/</loc><lastmod>2018-09-25T12:33:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2016/09/04/importing-zpk-and-zmk-into-thales-payshield-9000-hsm/</loc><lastmod>2023-01-18T12:08:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/downloads/</loc><lastmod>2015-09-15T07:58:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://arthurvandermerwe.com/2015/03/03/implementing-as2805-part-3-using-a-thales-9000-and-python/</loc><image:image><image:loc>https://arthurvandermerwe.com/wp-content/uploads/2015/02/logon_process.png</image:loc><image:title>Logon_process</image:title></image:image><lastmod>2022-03-17T23:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/06/25/doing-pin-translation/</loc><lastmod>2015-06-11T08:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/12/02/thales-9000-and-as2805-interchange-commands/</loc><lastmod>2016-06-14T02:41:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2015/05/30/dukpt-explained-with-examples/</loc><lastmod>2023-07-22T15:03:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2015/05/28/eftpos-initialisation-using-rsa-cryptography/</loc><lastmod>2017-01-30T00:59:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2015/05/20/atm-pin-encryption-using-3des/</loc><lastmod>2015-05-20T01:54:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2015/01/04/typical-cryptography-in-as2805-explained/</loc><lastmod>2016-04-01T11:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/06/22/trace-your-atm-transactions/</loc><lastmod>2015-03-10T11:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/08/06/testing-dukpt/</loc><lastmod>2015-03-10T11:29:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/08/06/thales-key-exchange-examples-and-troubleshooting/</loc><lastmod>2015-03-10T11:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/07/06/parsing-as25058583-messages/</loc><lastmod>2019-06-06T01:25:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/06/25/dynamic-key-exchange-models/</loc><lastmod>2022-04-20T18:11:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/06/25/credit-vs-debit/</loc><lastmod>2014-06-25T11:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com/2014/06/22/as2805-standards-for-eft/</loc><lastmod>2018-08-14T07:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://arthurvandermerwe.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-10-09T04:00:51+00:00</lastmod></url></urlset>
