Template Attack
Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product
To help you find your way through all the technical terms used in our business
Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product
Principle of the Trojan horse, it can be hardware or software. A trojan allows you to obtain information about what is going on in the system or to modify its operation.
Non-deterministic random number generator based on a full hardware solution.
A secure area inside a main processor. It runs in parallel of the operating system, in an isolated environment. It guarantees that the code and data loaded in the TEE are protected with respect to confidentiality and integrity.
A secure microcontroller with cryptographic features that provides a root of trust and enables the secure generation of keys and the ability to limit the use of them standardized by the Trusted Computing Group.