When I first started studying Post-Quantum Cryptography (PQC) for my Masters, I was a bit… Read the postUnderstanding Quantum Cryptography
A year ago I had written a paper for a Neural Networks class that I… Read the postTwitter Sentiment Analysis using combined LSTM-CNN Models
Have you ever wondered how IoT and other hardware manufactures debug and test their devices.… Read the post5-Min Tutorial: Gaining Root via UART
So lately I've been involved on a lot more Hardware and IoT hacking than usual.… Read the post5-Min Tutorial: Lifting Firmware with the Bus Pirate
Let me take you back to 2007-2008 in the warm tropical city of Caracas in… Read the postInternet Memories #2: Break The Rules
(Post originally written in August 2017. Finally got around publishing it...) I can't sleep in… Read the post5-Min Tutorial: Prototyping Web-Apps with Flask
It's been quite a while since I posted something to the blog. Sometimes life gets… Read the postRecap #3: Long Time No See
When I was a teenager I spent a lot of time setting networks up with… Read the postEagle Eye: Wi-Fi Monitoring
To those not on the field, the word 'Cryptography' seems to be surrounded by some… Read the postDemystifying Cryptography
As part of an Elliptic Curve Cryptography course, I decided to study Supersingular Isogeny Diffie-Hellman… Read the postIntroduction to Supersingular Isogeny Diffie-Hellman