Discover projects, groups and snippets. Share your projects with others
Companion git to "The Limits of Gradient Descent - Based Profiling Attacks against (Higher Order) Masking"
Spook software implementations for high-end microprocessors: from 32 bit generic target to AVX512 x86_64 processors.
ProVerif code modelling the Fido protocol
Java server-side library for U2F
U2F reference implementations