default banner

Template Attack

Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product

Trojan

Principle of the Trojan horse, it can be hardware or software. A trojan allows you to obtain information about what is going on in the system or to modify its operation.

True Random Number Generator (TRNG)

Non-deterministic random number generator based on a full hardware solution.

Trusted Execution Environment (TEE)

A secure area inside a main processor. It runs in parallel of the operating system, in an isolated environment. It guarantees that the code and data loaded in the TEE are protected with respect to confidentiality and integrity.

Trusted Platform Module (TPM)

A secure microcontroller with cryptographic features that provides a root of trust and enables the secure generation of keys and the ability to limit the use of them standardized by the Trusted Computing Group.

Contact