crocs-muni / sec-certs
Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).
☆18Updated this week
Alternatives and similar repositories for sec-certs:
Users that are interested in sec-certs are comparing it to the libraries listed below
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆11Updated last year
- Python library for Alphanov's PDM laser sources control☆11Updated 5 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆58Updated this week
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆67Updated last week
- An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers☆15Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆18Updated last year
- Side-channel traces visualizer☆14Updated 3 months ago
- Geolocate your files!☆16Updated 3 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- ☆22Updated 2 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆27Updated 5 years ago
- ☆20Updated 3 years ago
- A tool to help you understand TPM commands and responses.☆41Updated 4 months ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆28Updated 2 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆33Updated 2 years ago
- A fuzzer for APDU-based smartcard interfaces☆19Updated 2 weeks ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 6 months ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆29Updated 3 years ago
- Donjon hardware tool for circuits security evaluation☆74Updated 2 months ago
- Entity Attestation Token IETF Draft Standard☆18Updated last month
- Framework for building transparent memory encryption and authentication solutions☆27Updated 6 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 7 years ago
- PANORAMIX repo☆20Updated 2 years ago
- CardStalker provides a UART-driven smartcard reader at the T=1 (see ISO7816-3) level (link and physical layer), where most of the smartca…☆18Updated 2 years ago
- BAT KEM/Signature Reference Implementation☆21Updated 3 years ago
- ☆20Updated 5 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago