crocs-muni / sec-certsLinks
Tool for analysis of security certificates and their security targets (Common Criteria, NIST FIPS140-2...).
☆22Updated last week
Alternatives and similar repositories for sec-certs
Users that are interested in sec-certs are comparing it to the libraries listed below
Sorting:
- Tests support and behavior of elliptic curve cryptography implementations on JavaCards (TYPE_EC_FP and TYPE_EC_F2M) and in selected softw…☆81Updated last month
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Python Elliptic Curve Side-Channel Analysis toolkit.☆66Updated 3 weeks ago
- Intuitive Quantum Computation and Post-Quantum Cryptography☆63Updated 3 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆217Updated 5 years ago
- Python implementations of FIPS 203,204,205 (+ python wrappers for NIST's ACVP-Server crypto code)☆60Updated 6 months ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆69Updated 3 years ago
- Coherence is cryptographic server for modern web apps☆38Updated last year
- ☆24Updated 3 years ago
- Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things☆36Updated 2 years ago
- Post-quantum cryptography certificates☆75Updated last month
- Bibliothèque C et assembleur permettant le chiffrement/déchiffrement AES-128 de messages pour des composants grand public (famille STM32F…☆69Updated 3 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆37Updated 6 months ago
- Crypto Audit Guidelines☆134Updated 4 years ago
- WP6 of the SAFEcrypto project - a suite of lattice-based cryptographic schemes☆37Updated 2 years ago
- A curated list of resources about post-quantum cryptography.☆351Updated 4 months ago
- MAYO C implementation☆20Updated 8 months ago
- SIde-Channel Analysis toolKit: embedded security evaluation tools☆30Updated 3 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆32Updated 3 years ago
- A list of the state of IETF protocols and PQC☆73Updated 5 months ago
- SLotH -- An SLH-DSA/SPHINCS+ Hash-Based Signature Accelerator☆39Updated 9 months ago
- BAT KEM/Signature Reference Implementation☆23Updated 3 years ago
- Post-quantum Wireguard (Theory)☆11Updated 5 years ago
- MLKEM implementation optimized for embedded microcontrollers☆26Updated 2 weeks ago
- Lean cryptographic library usable for bare-metal environments☆79Updated last week
- Tool for generating Elliptic curve domain parameters☆130Updated 2 weeks ago
- The Scyther Tool for the symbolic analysis of security protocols☆105Updated 3 months ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆13Updated 6 months ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆74Updated 8 years ago