For embedded developers and hardware hackers, JTAG is the de facto standard for debugging and accessing microprocessor registers. This protocol has been in use for
Introduction Physically Unclonable Functions (PUFs) are, according to wikipedia a physically-defined “digital fingerprint” that serves as a unique identity for a semiconductor device such as
Quantum computing research is developing really fast, and we witnessed incredible advancements toward the realization of a practical quantum computer in the last few years.
CashShuffle is a plugin for the ElectronCash Bitcoin wallet software. CashShuffle implements a superset of the CoinShuffle protocol, whose aim is to anonymize cryptocurrency ownership
KZen hired Kudelski Security to perform a security assessment of their curv library, providing access to source code and documentation. KZen Curv is a library
We are besieged by simple problems…. Checklists can provide protection Atul Gawande, The Checklist Manifesto: How to Get Things Right Checklists are a simple yet