Ján Jančár

I do stuff with ECC, sometimes with smart-cards.
Now with side-channels.

profile image



  • Was part of the Artifact Review Committee for CHES 2022.
  • Was part of the Artifact Review Committee for CHES 2021.
  • Worked as a research intern during my Master's at the Centre for Research on Cryptography and Security on research on elliptic curve cryptography, smart-card security and side-channel attacks.
  • Participated in Google Summer of Code 2017, for the full period of 3 months. Worked for the Python Software Foundation org, on the Mailman subproject. I designed and implemented a new plugin API for the Mailman 3 mailing list server. This API was then used to build a plugin that adds support for PGP encrypted mailing lists.



  • seccerts.org: A project analysing the security certifications (Common Criteria and FIPS 140) landscape.
  • Minerva: A group of side-channel vulnerabilities in implementations of ECDSA in programmable smart cards and cryptographic software libraries.
  • ecgen: A tool for generating elliptic curve domain parameters.
  • ECTester: A toolkit for testing elliptic curve cryptography implementations on the JavaCard platform and in software libraries.
  • pyecsca: A toolkit for reverse engineering of black-box elliptic curve cryptography implementations using side-channel analysis.
  • std: A database of standard curves.
  • This website. Running on Flask on ArchLinuxARM on a Raspberry Pi DigitalOcean.
  • Some more-or-less working Ludum Dare game jam entries: Sphaera, Transmuto [play] and World Factory.