default banner

Template Attack

Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product

Trojan

Principle of the Trojan horse, it can be hardware or software. A trojan allows you to obtain information about what is going on in the system or to modify its operation.

True Random Number Generator (TRNG)

Non-deterministic random number generator based on a full hardware solution.

Trusted Execution Environment (TEE)

A secure area inside a main processor. It runs in parallel of the operating system, in an isolated environment. It guarantees that the code and data loaded in the TEE are protected with respect to confidentiality and integrity.

Trusted Platform Module (TPM)

A secure microcontroller with cryptographic features that provides a root of trust and enables the secure generation of keys and the ability to limit the use of them standardized by the Trusted Computing Group.

Vehicle-to-Everything (V2X)

Vehicular communication system that will allow vehicles to exchange information with each other, with the infrastructure and with pedestrians

Vehicule-to-Infrastructure (V2I)

Communication model that allows vehicles to share information with the components that support a country's highway system. Such components include overhead RFID readers and cameras, traffic lights, lane markers, streetlights, signage and parking meters.

Vehicule-to-Vehicule (V2V)

Communication between vehicles. Wireless network where automobiles send messages to each other with information about what they are doing. This data would include speed, location, direction of travel, braking, and loss of stability.

联系我们