The Germanyโs Agency for Innovation in Cybersecurity explains further in their blog:
๐https://www.cyberagentur.de/presse/widerstandskraft-fuer-die-kryptographie-von-uebermorgen/
@eshard.bsky.social
Beyond testing tools, solutions that deliver expertise. ๐ Chip & binary security testing www.eshard.com
The Germanyโs Agency for Innovation in Cybersecurity explains further in their blog:
๐https://www.cyberagentur.de/presse/widerstandskraft-fuer-die-kryptographie-von-uebermorgen/
eShard is proud to join the SPARTAQUS project with Bundeswehr University Munich under the German government "SCA4PQC" program.
Over the next 4 years, weโll push state of the art tooling and #PQC security testing expertise to evaluate real world implementations for side-channel leakage.
Weโre hiring at eShard โจ
๐ eshard.com/careers
We helped #DEKRA set up their new SoC cybersecurity lab, integrating our tools and tightening the workflow so SCA and EMFI tests are repeatable from day one.
๐ How we did it: eshard.com/posts/dekra-...
#hardware #cybersecurity #hardwarehacking
๐ iOS emulator update: we now have an #AI assistant to support your iOS security investigations.
What do you think? ๐ฌ
Our shortlist is still ongoing: u.eshard.com/ios-emulation #ios #software #cybersecurity
Our first webinar of the year is done. Thanks to everyone who joined!
โถ Up next: ๐๐ฑ๐๐ฎ๐ป๐ฐ๐ฒ๐ฑ ๐๐ฎ๐ฟ๐ฑ๐๐ฎ๐ฟ๐ฒ ๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด - ๐ ๐ผ๐ฑ๐ฒ๐ฟ๐ป ๐ง๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐
Stay tuned, more details coming soon.
#webinar #hardware #cybersecurity
It's this week ๐ฅ Register now to not miss out!
13.01.2026 15:01 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0#Webinar | Kicking off the year with hands-on fault injection on modern devices.
We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.
๐Session 1: u.eshard.com/m8ahb
๐Session 2: u.eshard.com/TjdEa
We wish everyone happy holidays! ๐
23.12.2025 14:58 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0๐ฉ Apply to the shortlist: u.eshard.com/ios-emulation
18.12.2025 10:56 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Update on the iOS emulator ๐ฅ
Weโve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.
Still cooking, but weโre getting close to sharing it with you. And more is coming with iOS26...
#ios #emulation #devsecops
We're at the AMD Security Working Group in Munich, Germany. ๐
#hardware #cybersecurity #pqc
We're on our way to Germany for the @AMD Security Working Group.
We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.
#cybersecurity #hardware #postquantumcryptography
We're live! ๐ด Come watch us: youtu.be/nzar2L4GUJ8
05.12.2025 15:14 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0๐ด We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: www.youtube.com/live/nzar2L4...
#cybersecurity #reverseengineering #binary #softwareengineering
Our Keccak webinar is a wrap! ๐ต Thank you to everyone who joined.
Ready for the next one? Tell us what you want to see next and we will make it happen. ๐ #cybersecurity
Itโs this week ๐ต Join us for a deep dive into Keccak and the side-channel angles behind its applications.
Register below โฌ
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#webinar #pqc #postquantum #nist
KMAC is one of the main ways Keccak is used in modern systems, which is why weโre exploring it through a practical use case in our next webinar.
Choose your timeslot and register below โฌ
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist
eShard and PQShield teamed up to put an ML-KEM hardware implementation through a real side-channel evaluation.
Take a look at what we found โก๏ธ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware
A short teaser of what weโll cover in our Keccak webinar.
Weโll walk through this KMAC256 state-recovery workflow step by step during the session.
Secure your spot ๐จ
๐ญ๐ฌ ๐๐ ๐๐ฒ๐๐๐ถ๐ผ๐ป (4am EST | 5pm SGT): u.eshard.com/wcUfh
๐ฑ ๐ฃ๐ ๐๐ฒ๐๐๐ถ๐ผ๐ป (4am EST | 5pm SGT): u.eshard.com/4hGSQ
#pqc #postquantum #nist
Want to understand how Keccak is applied and how it leaks in real scenarios? Join our webinar on December 4th.
10 am CET (4am EST | 5pm SGT) โก u.eshard.com/wcUfh
5 pm CET (11am EST | 12am SGT) โก u.eshard.com/4hGSQ
#pqc #nist #hardware
Did you know?
Keccak is everywhere, quietly protecting real systems, such as:
โข Connected devices checking data integrity
โข Firmware updates verifying authenticity
โข Embedded products securing messages
โข PQC standards like ML-KEM, ML-DSA, and SLH-DSA
โฌ
We're at Hardwear-io in the Netherlands ๐ #cybersecurity
21.11.2025 11:02 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0We're in Tokyo presenting our iOS emulator at the CODE BLUE Conference.
๐ฒ You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity
Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?
๐ Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
D-7 for the Hardwear.io Netherlands ๐ฅ
We're bringing our glitching fault injection demo to show how a tiny electrical glitch can change the full behavior of a chip. See you there!
#cybersecurity #events
Weโve updated our Post-Quantum Cryptography catalog of knowledge and attacks.
โ
Updated SCA and FI research on Kyber
โ
Improved CPA on Kyber
๐SASCA on Kyber targeting NTT
๐Chosen ciphertext attack on Keccak in Kyber
๐CPA on Dilithium
Request the full list of notebooks: www.eshard.com/contact #pqc
Next week weโll be at Code Blue in Japan. ๐
Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.
#reverseengineering #ios #softwaresecurity
Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?
๐ Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
Proud to join FORTRESS, an European Union funded project shaping Europeโs quantum-secure future.
eShard contributes its expertise in side-channel and fault-injection analysis to help validate hybrid secure boot architectures.
๐ Learn more: pq-fortress.eu