crocs-muni / sec-certs
Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).
☆15Updated this week
Alternatives and similar repositories for sec-certs:
Users that are interested in sec-certs are comparing it to the libraries listed below
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- List of crackpot 'scientists' and 'thinkers'☆14Updated 5 months ago
- This is the repository for the first-order masked Kyber on ARM Cortex-M4☆10Updated last year
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆65Updated last month
- ☆20Updated 3 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆56Updated last month
- Intuitive Quantum Computation and Post-Quantum Cryptography☆62Updated 2 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- a RTE-free X.509 parser☆59Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- A Common Criteria (CC) and FIDO certified FIDO U2F javacard applet.☆20Updated 3 years ago
- ☆22Updated 2 years ago
- Zigator: A security analysis tool for Zigbee and Thread networks☆29Updated last year
- Differential fuzzing for elliptic curves☆23Updated last year
- ☆12Updated 5 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆24Updated last week
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- library providing OPRF and Threshold OPRF based on libsodium☆21Updated this week
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆11Updated last month
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- The anonymous credentials zoo☆16Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- ☆32Updated 3 years ago
- ☆19Updated 5 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 5 years ago
- ☆12Updated 4 years ago
- Entity Attestation Token IETF Draft Standard☆18Updated this week
- This project gathers and standardize command line scripts to estimate the difficulty of solving hard mathematical problems related to cry…☆38Updated this week