{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"coinjoin-simulator","owner":"crocs-muni","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-10T15:32:57.181Z"}},{"type":"Public","name":"DiSSECT","owner":"crocs-muni","isFork":false,"description":"Distinguisher of Standard & Simulated Elliptic Curves via Traits.","topicNames":["standards","elliptic-curve-cryptography","africacrypt-2022"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-10T18:54:54.271Z"}},{"type":"Public","name":"tpmscan-artifact","owner":"crocs-muni","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"BSD 2-Clause \"Simplified\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-27T21:22:04.392Z"}},{"type":"Public","name":"RTT-configuration-calculator","owner":"crocs-muni","isFork":false,"description":"RTT Configuration Calculator","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-25T19:54:52.039Z"}},{"type":"Public","name":"algtest-pyprocess","owner":"crocs-muni","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-30T21:02:47.244Z"}},{"type":"Public","name":"javus","owner":"crocs-muni","isFork":false,"description":"JavaCard Vulnerability Scanner is a framework for testing the security of JavaCards. It does so by executing several POC attacks directly on the JavaCard. The potential for locking/bricking the JavaCard during the process is high, therefore it should be ran on spare JavaCards dedicated for testing and research.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T17:16:24.654Z"}},{"type":"Public","name":"biometrics-utils","owner":"crocs-muni","isFork":false,"description":"Utilities for assignments on biometric authentication","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-23T13:00:01.771Z"}},{"type":"Public","name":"RSABias","owner":"crocs-muni","isFork":false,"description":"Python tool for black-box analysis of RSA key generation in cryptographic libraries and for RSA key classification. ","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":6,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-06T12:50:44.170Z"}},{"type":"Public","name":"roca","owner":"crocs-muni","isFork":false,"description":"ROCA: Infineon RSA key vulnerability","topicNames":["rsa","detector","fingerprinting","discrete-logarithm","infineon","rsa-keys","roca-detector","roca-detec","python","roca"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":4,"issueCount":4,"starsCount":479,"forksCount":91,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-19T11:55:34.050Z"}},{"type":"Public","name":"booltest","owner":"crocs-muni","isFork":true,"description":"","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":3,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-10T12:13:54.460Z"}},{"type":"Public","name":"cevast","owner":"crocs-muni","isFork":false,"description":"CEVAST: SSL Certificate Validation and Statistics tool","topicNames":["certificate","validation-engine","x509certificates","ssl"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":3,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-22T22:45:47.982Z"}},{"type":"Public","name":"seccerts-overlay","owner":"crocs-muni","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-15T19:28:30.564Z"}},{"type":"Public","name":"bitcoin-keys-analysis","owner":"crocs-muni","isFork":false,"description":"A set of tools for extraction and analysis of Bitcoin ECDSA and Schnorr keys","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-14T08:29:43.292Z"}},{"type":"Public","name":"DiSSECT-gen","owner":"crocs-muni","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-30T11:35:11.030Z"}},{"type":"Public","name":"scrutiny","owner":"crocs-muni","isFork":false,"description":"An automated toolkit to analyze secure hardware, and build user-verifiable hardware profiles. SCRUTINY provides high-level frameworks to verify profiles against reference and produce detailed HTML reports. For now, SCRUTINY is capable of Java Card analysis and verification.","topicNames":["smartcard","certification","javacard","verify","card"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":3,"starsCount":4,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-25T14:26:52.950Z"}},{"type":"Public","name":"open-source-development-course-hw02-1","owner":"crocs-muni","isFork":false,"description":"Second homework of the Open source development course (part 1)","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":4,"issueCount":0,"starsCount":0,"forksCount":9,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-27T10:31:37.777Z"}},{"type":"Public","name":"minerva","owner":"crocs-muni","isFork":false,"description":"Artifacts for the \"Minerva: The curse of ECDSA nonces\" paper at CHES 2020","topicNames":["elliptic-curves","timing-attacks","side-channel-attacks","elliptic-curve-cryptography","ches-2020"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":26,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-06T19:27:51.567Z"}},{"type":"Public","name":"std-curves","owner":"crocs-muni","isFork":true,"description":"Standard curve database.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":21,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-10-01T15:11:27.960Z"}},{"type":"Public","name":"formula-for-disaster","owner":"crocs-muni","isFork":false,"description":"Artifacts for the \"A formula for disaster: a unified approach to elliptic curve special-point-based attacks\" paper at ASIACRYPT 2021","topicNames":["elliptic-curves","elliptic-curve-cryptography","asiacrypt-2021"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-17T15:53:29.522Z"}},{"type":"Public","name":"tls-warning-collector","owner":"crocs-muni","isFork":false,"description":"Automated tool for collecting screenshots of browser SSL/TLS warnings","topicNames":["tls","ssl","browser","warnings"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-07-13T20:22:58.104Z"}},{"type":"Public","name":"RTTWebInterface","owner":"crocs-muni","isFork":false,"description":"Web interface for Randomness Testing Toolkit.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-05-12T10:35:35.131Z"}},{"type":"Public","name":"rtt-deployment","owner":"crocs-muni","isFork":false,"description":"Set of scripts automating deployment of randomness-testing-toolkit on remote servers.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":4,"starsCount":2,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-05-12T10:34:43.252Z"}},{"type":"Public","name":"eacirc-utils","owner":"crocs-muni","isFork":false,"description":"Utils for experiment creation and result postprocessing","topicNames":["automation","cryptography","research-tool","randomness"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-02-21T15:21:15.054Z"}},{"type":"Public","name":"open-source-development-course-hw02-2","owner":"crocs-muni","isFork":false,"description":"Second homework of the Open source development course (part 2)","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-13T07:32:16.482Z"}},{"type":"Public","name":"rpi-testbed-config","owner":"crocs-muni","isFork":true,"description":"Config and tools for rpi testbed","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-03-28T16:51:32.735Z"}},{"type":"Public","name":"acsac2017-data-tools","owner":"crocs-muni","isFork":false,"description":"ACSAC 2017 paper - dataset tools","topicNames":["python","research","tools","paper","datasets","data-processing","acsac"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-12-04T17:30:18.113Z"}},{"type":"Public","name":"eanet","owner":"crocs-muni","isFork":false,"description":"ANN version of EACirc","topicNames":["cryptography","keras","neural-networks","research-tool","randomness"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-05-20T20:47:17.103Z"}},{"type":"Public","name":"data-generation","owner":"crocs-muni","isFork":false,"description":"data generation of the given form","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-02-27T12:10:37.591Z"}},{"type":"Public","name":"GANet","owner":"crocs-muni","isFork":false,"description":"The GANet project provides possibility to setup virtual image with target application, which is then tested by the attacks generated using genetic programming.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":2,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2014-09-09T09:09:32.880Z"}}],"repositoryCount":29,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}