Posts with the tag english:

EUCLEAK : Using side-channel attack to extract secret key from YubiKey 5 Series

This article aims to give an in depth description on EUCLEAK, an attack that was discovered by NinjaLab. Focusing on how side-channels attacks were used to exploit a vulnerability found in ECDSA implementation in YubiKey 5 Series and to reverse engineer the ECDSA algorithm.

Implementation of collision avoidance algorithms in real time autonomous vehicles

This article describes the implementation of collision avoidance algorithms in real-time autonomous vehicles.

Chip binning : why your CPU is most likely broken (partially)?

CPU manufacturing is so complex that the chips often have imperfections. Some cores do not work or must run at lower speeds. Manufacturers test them and sell based on performance.

Evolution of GPU Architectures and Hardware Graphics Pipeline through Nintendo Consoles - Part 1

This article goes over the evolution of the hardware graphics pipeline on GPUs across the different game console generations.

Optimizing regular expressions

This article will explain in detail how to optimize regular expressions. It will explore various techniques to reduce backtracking and improve speed, enabling the writing of more efficient and high-performance regex.

LadderLeak, comment retrouver une clef privée ECC sur analyse de consommation électrique

Short article to cover the LadderLeak problem for ECC

Holographic Displays: Your Windshield as a Virtual Assistant

A quick view on how holographic displays aim to aid driving

How to write you first kernel

In this article, we’ll write a simple 32bits ‘Hello, World!’ kernel for x86

IMUs and Kalman Filters

How to use an MPU6050 with an STM32 and use an Kalman Filter to measure angles

Why your contactless credit card can't be cloned

How the EMV specification prevents contactless cloning and tracking