{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"PoMMES","owner":"ChairImpSec","isFork":false,"description":"PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-03T15:40:06.288Z"}},{"type":"Public","name":"PROLEAD","owner":"ChairImpSec","isFork":false,"description":"PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software","allTopics":["side-channel","armv7m","side-channel-attacks","armv6m","hardware-simulation","side-channel-analysis","leakage-detection","probing-security","software-simulation"],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":1,"issueCount":2,"starsCount":29,"forksCount":26,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-12T11:03:23.542Z"}},{"type":"Public","name":"RAMBAM","owner":"ChairImpSec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-12T15:18:30.309Z"}},{"type":"Public","name":"DL_Collision_Attack","owner":"ChairImpSec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-16T13:58:12.266Z"}},{"type":"Public","name":"Low_Random_Second_Order_AES","owner":"ChairImpSec","isFork":false,"description":"Designs of second-order SCA-secure hardware implementations of AES","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-29T13:18:59.630Z"}},{"type":"Public","name":"Low-Latency-masked-cubic-functions","owner":"ChairImpSec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"VHDL","color":"#adb2cb"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-02T13:53:41.423Z"}},{"type":"Public","name":"COMAR","owner":"ChairImpSec","isFork":false,"description":"Composable Gadgets with Reused Fresh Masks","allTopics":[],"primaryLanguage":{"name":"Verilog","color":"#b2b7f8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-25T15:54:42.207Z"}}],"repositoryCount":7,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}