Michał Leszczyński
Home
Blog
Contact
Category List
Category List
|
Atom Feed
algorithm
(2)
android
(1)
c
(1)
crypto
(1)
embedded
(1)
english
(4)
gothic
(1)
meltdown
(1)
microprocessor
(1)
mobile
(3)
polish
(3)
programming
(1)
re
(1)
security
(3)
spectre
(1)
algorithm
Adjacency list - mapping of coordinates to a single dimensional array
An algorithm for offline electronic rental door lock
android
Communication between Android Host-based Card Emulation and a microprocessor system with NFC transceiver frontend
c
Adjacency list - mapping of coordinates to a single dimensional array
crypto
An algorithm for offline electronic rental door lock
embedded
Communication between Android Host-based Card Emulation and a microprocessor system with NFC transceiver frontend
english
Communication between Android Host-based Card Emulation and a microprocessor system with NFC transceiver frontend
Adjacency list - mapping of coordinates to a single dimensional array
An algorithm for offline electronic rental door lock
Playing with Gothic Virtual File System (VDFS)
gothic
Playing with Gothic Virtual File System (VDFS)
meltdown
Meltdown and Spectre explained: Processor hacking (PL)
microprocessor
Communication between Android Host-based Card Emulation and a microprocessor system with NFC transceiver frontend
mobile
KNOX Meetup 02 - Presentation (PL)
Communication between Android Host-based Card Emulation and a microprocessor system with NFC transceiver frontend
Analysis of Przelewy24 mobile payment library from the security point of view (PL)
polish
KNOX Meetup 02 - Presentation (PL)
Meltdown and Spectre explained: Processor hacking (PL)
Analysis of Przelewy24 mobile payment library from the security point of view (PL)
programming
Adjacency list - mapping of coordinates to a single dimensional array
re
Playing with Gothic Virtual File System (VDFS)
security
KNOX Meetup 02 - Presentation (PL)
Meltdown and Spectre explained: Processor hacking (PL)
Analysis of Przelewy24 mobile payment library from the security point of view (PL)
spectre
Meltdown and Spectre explained: Processor hacking (PL)