You have probably heard about some big announcement by Google on the topic of “quantum supremacy”, and maybe also about a rebuttal by IBM criticizing
Audit of Binance TSS-lib
Binance created an open source software library available on Github implementing a threshold ECDSA signature scheme (TSS), and hired Kudelski Security to perform a security
Audit of KZen’s Multi-party ECDSA
KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation.
Power (Analysis) to the People
Power analysis is a specific kind of side-channel analysis performed on the power consumption of a target device. This technique can be applied for various
FIDO2: Solving the Password Problem
Introduction Passwords are a problem and you’d be hard-pressed to find a security professional who disagrees. According to Verizon’s 2019 Data Breach Investigation Report, 62%
SWD part 2 : the MEM-AP
After part 1, you should now be familiar with the basics of SWD. We finished the article at the gates of an important part of