eShard
banner
eshard.bsky.social
eShard
@eshard.bsky.social
Beyond testing tools, solutions that deliver expertise.
🌐 Chip & binary security testing
www.eshard.com
Want to understand how Keccak is applied and how it leaks in real scenarios? Join our webinar on December 4th.

10 am CET (4am EST | 5pm SGT) ➡ u.eshard.com/wcUfh
5 pm CET (11am EST | 12am SGT) ➡ u.eshard.com/4hGSQ

#pqc #nist #hardware
Welcome! You are invited to join a meeting: Webinar | Side-channel attacks on Keccak. After registering, you will receive a confirmation email about joining the meeting.
In 2015, NIST standardized a new family of hash and extendable-output functions known as SHA-3, all built on the Keccak algorithm. Since then, Keccak has been adopted in several other standards, incl...
u.eshard.com
November 21, 2025 at 1:32 PM