Hello world! Welcome to my personal Cyberblog. I like to write about subjects within the field of hardware security, artificial intelligence and cryptography, were smaller topics are discussed with infographics. Next to that, I also like to write about my personal hardware hobby projects. Happy reading!
Drawing credits: @towel__art

Recent Posts

Sinterklaas surprise: Arduino Memory game

4 minute read

This post is coming around half a year late, but I still want to tell you about a small Arduino project. It is a yearly tradition around Sinterklaas to buy a...

AI: Deep Learning

2 minute read

By now, you probably have the feeling why the terminology of neural networks and deep learning is used interchangeably. In fact, the neural network is “learn...

AI: Learning the Decision Boundary

1 minute read

Instead of using regular statistics to detect the decision boundary, we can try to learn the function iteratively. This is where neural networks come in hand...

Introduction to Artificial Intelligence & Data

less than 1 minute read

Artificial Intelligence, in short AI, is a very broad term with a lot of associations. It is often considered a “black box”, because we are not always how de...

AES: the Substitution Box

1 minute read

One particular part of the AES operation is interesting for a hardware attack. This is the SubBytes operation, where each byte will be substituted with anoth...