Encryption technique that provides public-key encryption similar to RSA. While the security strength of RSA is based on very large prime numbers, ECC uses the mathematical theory of elliptic curves and achieves the same security level with much smaller keys.
Elliptic Curve Digital Signature Algorithm (ECDSA)
Digital signature algorithm with public key, variant of DSA. It uses cryptography on elliptic curves.
Entropy
A measure of the disorder or randomness in a closed system - A measure of the amount of uncertainty an attacker faces to determine the value of a secret.
Fault Injection Analysis (FIA)
Sata perturbation (i.e., alteration of the type of data the execution environment components pass to the application, or that the application’s components pass to one another). Fault injection can reveal the effects of security defects on the behavior of the components themselves and on the application as a whole.
Field-Programmable Gate Array (FPGA)
An integrated circuit designed to be configured and reconfigured by a customer or a designer after manufacturing (hardware)
FIPS 140-3
Federal Information Processing Standard Publication 140-3, (FIPS 140-3) is a U.S. government computer security standard used to approve cryptographic modules
Firmware Over-The-Air Update (FOTA)
Technology that enables the operators of Internet-connected devices to perform upgrades of their firmware versions remotely and seamlessly, without the need of physical intervention into the device.
Focused Ion Beam (FIB)
Scientific instrument that uses a focused beam of ions, usually gallium, to image a sample. FIB is often used in the semiconductor industry to repair or modify a semiconductor device. It also allows an attacker to modify a system like cutting alarm wires.