This article aims to give an in depth description on EUCLEAK, an attack that was discovered by NinjaLab. Focusing on how side-channels attacks were used to exploit a vulnerability found in ECDSA implementation in YubiKey 5 Series and to reverse engineer the ECDSA algorithm.
Introduction to USB keyboard protocol
This article describes the implementation of collision avoidance algorithms in real-time autonomous vehicles.
CPU manufacturing is so complex that the chips often have imperfections. Some cores do not work or must run at lower speeds. Manufacturers test them and sell based on performance.
This article will explain in detail how to optimize regular expressions. It will explore various techniques to reduce backtracking and improve speed, enabling the writing of more efficient and high-performance regex.
Une brève introduction au monde de l’internet par satellite avec une présentation des spécificités de la société Starlink
Short article to cover the LadderLeak problem for ECC
Introduction to BlueZ and its API
A short introduction to the world of display protocols, detailing parts of the design of the X Window System, its shortcomings and the rise of the Wayland protocol.
A quick view on how holographic displays aim to aid driving