Repo to store my writing about the links between MI/SD/RE, with the hope that it gives something ...
Companion git to "The Limits of Gradient Descent - Based Profiling Attacks against (Higher Order) Masking"
Spook software implementations for high-end microprocessors: from 32 bit generic target to AVX512 x86_64 processors.
ProVerif code modelling the Fido protocol
Java server-side library for U2F