default banner

Simple Power Analysis (SPA)

Special methodology to make side-channel attacks

SM2

Public key cryptographic algorithm based on elliptic curves, used for e.g. generation and verification of digital signatures

SM3

Cryptographic hash function mainly used in digital signatures, message authentication codes, and pseudorandom number generators.

SM4

Symmetric encryption algorithm, specifically a blockcipher, designed for data encryption

Symmetric encryption or cryptography

Symmetric encryption is a method of cryptography in which a single key is responsible for encrypting and decrypting data. The parties involved share this key, the password or a secret phrase and can use them to decrypt or encrypt messages of their choice.

System-on-Chip (SoC)

A complete embedded system on a single chip, which may include memory, one or more microprocessors, interface devices, or any other component necessary to perform the expected function.

Template Attack

Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product

Trojan

Principle of the Trojan horse, it can be hardware or software. A trojan allows you to obtain information about what is going on in the system or to modify its operation.

Contact