default banner

Normalized Inter-Class Variance (NICV)

NICV has a low computation requirement and it detects leakage using public information like input plaintexts or output ciphertexts only. It can also be used to test the efficiency of leakage models, the quality of traces and robustness of countermeasures.

Office of the State Commercial Cryptography Administration (OSCCA)

Central government administrative body that issues and regulates commercial cryptography certificate products in China. The administration maintains a research institute, cryptographic analysis and evaluation center and chip labs.

One Time Programmable (OTP)

Form of digital memory where the setting of each bit is locked by a fuse or antifuse. It is one type of read-only memory (ROM). The data in them are permanent and cannot be changed. OTPs are used in digital electronic devices to store permanent data, usually low level programs such as firmware or microcode. The key difference from a standard ROM is that the data is written into a ROM during manufacture, while with a OTP the data is programmed into them after manufacture. In security, it is usually used to store keys.

Original Equipment Manufacturer (OEM)

An original equipment manufacturer (OEM) is generally perceived as a company that produces parts and equipment that may be marketed by another manufacturer. It can mean the maker of a system that includes other companies' subsystems, an end-product producer, an automotive part that is manufactured by the same company that produced the original part used in the automobile's assembly, or a value-added reseller.

Pen-testing (penetration testing)

Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Physically Unclonable Function (PUF)

Physically Unclonable Functions or Physical Unclonable Functions are functions implemented in a device that is produced or configured with the security objective that random fluctuations in the production process lead to different behaviors and are difficult to reproduce physically. PUF is usually used to generate keys

POCGI (Power & Clock Glitch Injector)

POwer and Clock Glitch Injector (POCGI) is a solution of Secure-IC used to perform modifications of voltage and clock frequency such as underfeeding (voltage can be finely tuned to a lower value to make the target more sensitive to injection keeping the target fully functional), Power Glitch (sudden modification of the system power supply modifies the behavior of the target which will not work properly) and Clock Glitch (frequency change of the internal clock for a short period generates errors).

Probing

Attack methodology consisting in reading the values that can be transmitted on a wire in the electronic system, this can be done for example with a focused ion beam

联系我们