Posts with the tag hardware:

How are processors made and why their production becomes more complex over the years

Deep dive through the manufacturing process of CPUs and what are the challenges related to it

EUCLEAK : Using side-channel attack to extract secret key from YubiKey 5 Series

This article aims to give an in depth description on EUCLEAK, an attack that was discovered by NinjaLab. Focusing on how side-channels attacks were used to exploit a vulnerability found in ECDSA implementation in YubiKey 5 Series and to reverse engineer the ECDSA algorithm.

Many processes: A VHDL state machine pattern

Introducing multi-process FSM in VHDL