eShard
banner
eshard.bsky.social
eShard
@eshard.bsky.social
Beyond testing tools, solutions that deliver expertise.
🌐 Chip & binary security testing
www.eshard.com
It’s this week 🔵 Join us for a deep dive into Keccak and the side-channel angles behind its applications.

Register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ

#webinar #pqc #postquantum #nist
December 1, 2025 at 1:24 PM
KMAC is one of the main ways Keccak is used in modern systems, which is why we’re exploring it through a practical use case in our next webinar.

Choose your timeslot and register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist
November 27, 2025 at 1:31 PM
eShard and PQShield teamed up to put an ML-KEM hardware implementation through a real side-channel evaluation.

Take a look at what we found ➡️ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware
November 26, 2025 at 2:59 PM
A short teaser of what we’ll cover in our Keccak webinar.
We’ll walk through this KMAC256 state-recovery workflow step by step during the session.

Secure your spot 🚨
𝟭𝟬 𝗔𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/wcUfh
𝟱 𝗣𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/4hGSQ

#pqc #postquantum #nist
November 25, 2025 at 4:12 PM
We're at Hardwear-io in the Netherlands 👋 #cybersecurity
November 21, 2025 at 11:02 AM
We're in Tokyo presenting our iOS emulator at the CODE BLUE Conference.

📲 You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity
November 18, 2025 at 10:57 AM
D-7 for the Hardwear.io Netherlands 🔥

We're bringing our glitching fault injection demo to show how a tiny electrical glitch can change the full behavior of a chip. See you there!

#cybersecurity #events
November 13, 2025 at 5:47 PM
We’ve updated our Post-Quantum Cryptography catalog of knowledge and attacks.

✅Updated SCA and FI research on Kyber
✅Improved CPA on Kyber
🆕SASCA on Kyber targeting NTT
🆕Chosen ciphertext attack on Keccak in Kyber
🆕CPA on Dilithium

Request the full list of notebooks: www.eshard.com/contact #pqc
November 13, 2025 at 12:40 PM
Next week we’ll be at Code Blue in Japan. 🎌

Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.

#reverseengineering #ios #softwaresecurity
November 12, 2025 at 10:30 AM
Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?

🔗 Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
November 3, 2025 at 5:20 PM
Proud to join FORTRESS, an European Union funded project shaping Europe’s quantum-secure future.

eShard contributes its expertise in side-channel and fault-injection analysis to help validate hybrid secure boot architectures.

🌐 Learn more: pq-fortress.eu
October 31, 2025 at 2:51 PM
If you’ve been following our recent events, you’ve seen how our Pattern Detector proved its capabilities, now working on electromagnetic (EM) signals as well as power.

We’ll be demonstrating it again at Hardwear.io in the Netherlands this November.

👉 Contact us to order yours today: www.eshard.com
October 29, 2025 at 3:35 PM
Our EMFI probe kit has already proven to be a favorite with analysts, and now it’s getting even better.

We’ve added three new hand-wound probes in a deeper cylindrical format, and a brand-new body bias injection (BBI) module.

→ Contact us to pre-order: www.eshard.com/contact
October 27, 2025 at 9:49 AM
A new post-quantum hero has arrived. 🦸‍♂️

Meet HQC, the backup superhero chosen by NIST to defend our AES keys when quantum computers rise.

Learn its origin story (and check our educational Python implementation): eshard.com/posts/superh...
October 24, 2025 at 9:02 AM
eShard won the European Space Agency tender to supply a Hardware Security Laboratory at ESTEC.
The lab covers Side-Channel Analysis, Electromagnetic Fault Injection, and voltage and clock glitching.

Read more: eshard.com/posts/esa-es... #hardware #cybersecurity
October 22, 2025 at 9:47 AM
Hello from Songdo, South Korea, at the ICCC Conference 👋🔬
October 21, 2025 at 12:30 PM
You’ve followed the journey since our first QEMU boot logs. Now it’s time to open the doors: the iOS emulator will be available for early access.

📩 Apply to the shortlist. u.eshard.com/ios-emulator...

Limited time and spots.
#ios #cybersecurity #emulation
October 7, 2025 at 2:03 PM
Everyone thought the “hedged” mode of ML-DSA (Dilithium) fixed fault attacks. New research presented at CHES shows that’s not the case. A "fault then correct" trick still works.

We break it down in our latest Expert Review. ➡️ eshard.com/posts/expert...

#pqc #postquantumcryptography #cryptography
October 3, 2025 at 9:42 AM
On Oct 23rd, we’re going live for a deep dive into the latest SCA techniques and the countermeasures vendors are using.

10:00 CEST (4 AM EST • 4 PM SGT) → u.eshard.com/webinar-sca-...
17:00 CEST (11 AM EST • 11 PM SGT) → u.eshard.com/webinar-sca-...
#hardware #cybersecurity
September 29, 2025 at 12:32 PM
🚀 We’re live from #CHES25 in beautiful Kuala Lumpur!
September 15, 2025 at 11:03 AM
Windows 11 in esReverse. 💻 Full system emulation to boot, record, and rewind your analysis from kernel to userland.

Read the guide: eshard.com/posts/window... #windows #emulation #reverseengineering
September 9, 2025 at 11:43 AM
Malware doesn’t like being watched. 👾 That’s why so many samples try to detect if they’re running inside a virtual machine and change behavior to fool analysts.

We explored these anti-VM techniques on our latest blog: eshard.com/posts/window...
And how to bypass them.
#reverseengineering #malware
September 2, 2025 at 2:24 PM
Packing for CHES 🧳👨‍💻
Bringing our Pattern Detector demo (side-channel spotting made easier) and the new ML-KEM (Kyber) starter kits.

Come say hi if you’re around. #pqc
September 1, 2025 at 4:36 PM
Our Windows CTF is coming to Nullcon in Berlin, Sept 4-5 🎯 github.com/eshard/TTA-CTF

Play for a chance to win a Binary Ninja license or a Flipper Zero.

#CTF #FlipperZero #windows #reverseengineering
August 14, 2025 at 9:41 AM
esReverse now supports Windows 11 up to the May 27, 2025 update (24H2 Build 26100.4066).

Our blog post shows how to create a Windows 11 VM and run it in esReverse for full system emulation. → eshard.com/posts/window...

#windows11 #ReverseEngineering #emulation #cybersecurity
August 12, 2025 at 11:49 AM