AI: Deep Learning
By now, you probably have the feeling why the terminology of neural networks and deep learning is used interchangeably. In fact, the neural network is “learn...
By now, you probably have the feeling why the terminology of neural networks and deep learning is used interchangeably. In fact, the neural network is “learn...
Instead of using regular statistics to detect the decision boundary, we can try to learn the function iteratively. This is where neural networks come in hand...
Artificial Intelligence, in short AI, is a very broad term with a lot of associations. It is often considered a “black box”, because we are not always how de...
One particular part of the AES operation is interesting for a hardware attack. This is the SubBytes operation, where each byte will be substituted with anoth...
In this post, we are going to zoom in on the inner workings of one AES block. AES operates in rounds, which are usually 10, 12 or 14 rounds (matching with AE...
AES (Advanced Encryption Standard) is the NIST-standard for encrypting data and is widely used. AES is a block cipher, which means that the data is encrypted...
Side channels are channels on which information is leaked through the physical properties of the device. These side channels can occur in a more technical se...
The CPU is the computational unit of a computer. It executes a sequence of instructions, which is provided directly or indirectly by the programmer. Instruct...
The field of hardware security refers to protecting the physical components of a computer. It assumes direct access to the hardware and this field includes a...
This post is coming around half a year late, but I still want to tell you about a small Arduino project. It is a yearly tradition around Sinterklaas to buy a...