{"payload":{"pageCount":2,"repositories":[{"type":"Public","name":"fhewsyn","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-19T17:45:31.978Z"}},{"type":"Public","name":"AGEMA","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Automated Generation of Masked Hardware","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":3,"starsCount":15,"forksCount":2,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-07T15:49:54.215Z"}},{"type":"Public","name":"BIKE","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Contains HDL code for the PQC Key Encapsulation Mechanism BIKE","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":3,"issueCount":0,"starsCount":11,"forksCount":2,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-05T23:54:55.933Z"}},{"type":"Public","name":"VERICA","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":1,"starsCount":11,"forksCount":2,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-25T06:47:56.768Z"}},{"type":"Public","name":"lattice-anonymous-credentials","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-11T10:03:47.058Z"}},{"type":"Public","name":"Combined-Threshold-Implementation","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Implementations for CTI evaluation","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-28T14:02:07.205Z"}},{"type":"Public","name":"dilithium-faults","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-31T12:49:33.546Z"}},{"type":"Public","name":"DL-LA","owner":"Chair-for-Security-Engineering","isFork":false,"description":"DL-LA: Deep Learning Leakage Assessment. Source Code and Traces.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":11,"forksCount":6,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T14:14:54.781Z"}},{"type":"Public","name":"owl","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"CMake","color":"#DA3434"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-27T10:21:07.114Z"}},{"type":"Public","name":"pqc-masking-ise","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-28T06:35:26.681Z"}},{"type":"Public","name":"EASIMask","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-26T07:42:00.685Z"}},{"type":"Public","name":"maskedFWPS","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Masked software implementations of fixed-weight polynomial sampling algorithms.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-08T16:03:10.753Z"}},{"type":"Public","name":"LWC-Masking","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":2,"starsCount":6,"forksCount":2,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-03T14:35:20.063Z"}},{"type":"Public","name":"SILVER","owner":"Chair-for-Security-Engineering","isFork":false,"description":"SILVER - Statistical Independence and Leakage Verification","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":11,"forksCount":4,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-16T14:51:00.775Z"}},{"type":"Public","name":"XMSS-LMS-HW-Agile","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Code for the paper \"Agile Acceleration of Stateful Hash-Based Signatures in Hardware\"","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-07T08:20:41.155Z"}},{"type":"Public","name":"SAIREDA","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Security-Aware Intermediate Representation and Electronic Design Automation","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-27T20:32:30.205Z"}},{"type":"Public","name":"SCARF","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Reference Code for the SCARF Cache Cipher","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-12T11:13:08.677Z"}},{"type":"Public","name":"TLBCoat","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Source code for the paper \"Risky Translations: Securing TLBs against Timing Side Channels\"","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-04T12:15:28.384Z"}},{"type":"Public","name":"Low_Random_Masking","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-30T13:39:43.534Z"}},{"type":"Public","name":"Write-Write","owner":"Chair-for-Security-Engineering","isFork":false,"description":"PoC Code from the Paper \"Write Me and I'll Tell You Secrets - Write-After-Write Effects On Intel CPUs\"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-28T08:27:40.523Z"}},{"type":"Public","name":"COMAR","owner":"Chair-for-Security-Engineering","isFork":false,"description":" Composable Gadgets with Reused Fresh Masks ","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-25T14:35:14.136Z"}},{"type":"Public","name":"KEM-NIZKPoP","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Proof-of-possession for KEM certificates using verifiable generation","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-02T06:25:06.000Z"}},{"type":"Public","name":"XMSS-VHDL","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Configurable Hardware Implementation of XMSS","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-23T14:23:55.003Z"}},{"type":"Public","name":"HPC3","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-13T08:28:17.884Z"}},{"type":"Public","name":"RacingBIKE","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"SystemVerilog","color":"#DAE1C2"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-13T07:25:01.231Z"}},{"type":"Public","name":"dilithium-artix7","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Implementations for all round-3 parameter sets of the PQC signature scheme Dilithium","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":1,"starsCount":7,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-17T09:14:04.032Z"}},{"type":"Public","name":"NullFresh2","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Codes and designs of second-order SCA secure hardware implementations with almost no fresh randomness ","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":1,"starsCount":1,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-13T16:07:13.657Z"}},{"type":"Public","name":"Low-Latency_Keccak","owner":"Chair-for-Security-Engineering","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-02T08:06:05.502Z"}},{"type":"Public","name":"GHPC","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Generic Hardware Private Circuits","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-18T17:49:28.509Z"}},{"type":"Public","name":"FrodoKEM","owner":"Chair-for-Security-Engineering","isFork":false,"description":"Hardware Implementation of FrodoKEM","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-03T10:55:39.565Z"}}],"repositoryCount":35,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}