The idea for this post sparked from a recent conversation I had where a non-computer… Read the post11 oddly specific (yet useful) security tips
When I got my first bank card back in 2010, I got really interested on… Read the postMagstripe tinkering
When I first arrived at UCSB, I realized that this was the first time I… Read the postCapture the Keys - Chapter 1: Clogger
A long time ago, I saw a couple of banks that produced RFID-enabled credit cards.… Read the postSurvey of Cryptographic Implementations and Vulnerabilities on Passive RFID Devices
It was during Winter 2016 that I took an extremely interesting course on Computational Algebra.… Read the postCalculating Nonlinearity of Boolean Functions with Walsh-Hadamard Transform
So lately I've been diving in deep on the security world. I just started working… Read the postPenTesting 101: Setting up your lab
This past quarter I was enrolled in a class CS162 at UCSB called "Programming Languages".… Read the post5-Min Tutorial: Caesar Cipher in Scala
Last quarter I took my first grad class at UCSB called CS:290T "Computational Algebra". It… Read the postPhysical Unclonable Functions