Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2
ANSSI-CC-2017/53
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 or v2.07.003 or v2.09.002, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003 or v2.09.002, and Toolbox v1.02.013 or v2.07.003 or v2.09.002 libraries and with specific IC dedicated software (firmware)
None
name S3D350A/S3D300A/S3D264A/ S3D232A/ S3D200A/ S3K350A/ S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2 Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 or v2.07.003 or v2.09.002, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003 or v2.09.002, and Toolbox v1.02.013 or v2.07.003 or v2.09.002 libraries and with specific IC dedicated software (firmware)
scheme FR DE
status archived active
not_valid_after 24.08.2022 26.11.2025
not_valid_before 24.08.2017 07.11.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_53fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V6a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_53en.pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V6b_pdf.pdf
manufacturer Samsung Electronics Co., Ltd. Infineon Technologies AG
manufacturer_web https://www.samsung.com https://www.infineon.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 ALC_FLR.1, EAL6+
dgst 2fa836f2d10827ff f5808a97db98a544
heuristics/cert_id ANSSI-CC-2017/53
heuristics/cert_lab CEA []
heuristics/cpe_matches {} cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2017-15361
heuristics/extracted_sars ASE_SPD.1, ALC_DVS.2, AGD_OPE.1, ALC_TAT.2, ATE_FUN.1, ATE_IND.2, ASE_REQ.2, ALC_CMS.5, ADV_FSP.5, ADV_IMP.1, ASE_ECD.1, ALC_CMC.4, ADV_TDS.4, ASE_TSS.1, ADV_INT.2, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, AGD_PRE.1, ADV_ARC.1, ATE_DPT.3, ASE_OBJ.2 ALC_FLR.1
heuristics/extracted_versions 32, 2 1.02.013, 1.01, 2.07.003, 2.02.012, 2.09.002
heuristics/report_references/directly_referenced_by ANSSI-CC-2018/12 {}
heuristics/report_references/directly_referencing ANSSI-CC-2017/11 {}
heuristics/report_references/indirectly_referenced_by KECS-ISIS-0937-2019, ANSSI-CC-2018/14, ANSSI-CC-2021/03, ANSSI-CC-2021/05, 2017-62-INF-3233, ANSSI-CC-2021/06, ANSSI-CC-2019/59, ANSSI-CC-2019/61, ANSSI-CC-2019/02, ANSSI-CC-2018/12, ANSSI-CC-2018/13, KECS-ISIS-0936-2019, ANSSI-CC-2019/60, ANSSI-CC-2019/51, ANSSI-CC-2021/04, 2017-63-INF-3232, ANSSI-CC-2019/01, ANSSI-CC-2019/03 {}
heuristics/report_references/indirectly_referencing ANSSI-CC-2017/11 {}
heuristics/scheme_data
  • cert_id: ANSSI-CC-2017/53
  • description: Le produit certifié est le « S3D350A /S3D300A /S3D264A /S3D232A /S3D200A /S3K350A /S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, référence S3D350A/S3D300A/S3D264A/S3D232A/S3D200A/S3K350A/S3K300A_rev2_SW10-07-10-10-100_GU14-14-003-09-10-21-12-08-00 » développé par SAMSUNG ELECTRONICS CO. LTD. Les sept mic
  • developer: Samsung Electronics Co. Ltd.
  • enhanced:
  • level: EAL5+
  • product: S3D350A /S3D300A /S3D264A /S3D232A /S3D200A /S3K350A /S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software, revision 2
  • sponsor: Samsung Electronics Co. Ltd.
  • url: https://cyber.gouv.fr/produits-certifies/s3d350a-s3d300a-s3d264a-s3d232a-s3d200a-s3k350a-s3k300a-32-bit-risc
  • category: Smart Cards and similar devices
  • cert_id: BSI-DSZ-CC-0782-V6-2024
  • certification_date: 07.11.2024
  • enhanced:
    • applicant: Infineon Technologies AG Am Campeon 1-15 85579 Neubiberg
    • assurance_level: EAL6+,ALC_FLR.1
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte07/0782V6c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 07.11.2024
    • description: The Target of Evaluation (TOE) is Infineon smart card IC (Security Controller) M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software. The TOE provides a real 16-bit CPU-architecture and is compatible to the Intel 80251 architecture. The major components of the core system are the two CPUs (Central Processing Units), the MMU (Memory Management Unit) and MED (Memory Encryption/Decryption Unit). The dual interface controller is able to communicate using either the contact based or the contactless interface. The TOE consists of the hardware part, the firmware parts and the software parts. The software parts are differentiated into: the cryptographic libraries RSA, EC and SHA-2 and the supporting libraries Toolbox and Base. RSA, EC, SHA-2 and Toolbox provide certain functionality to the Smartcard Embedded Software. This TOE is intended to be used in smart cards for particularly security relevant applications and for its previous use as developing platform for smart card operating systems. The term Smartcard Embedded Software is used in the following for all operating systems and applications stored and executed on the TOE. The TOE is the platform for the Smartcard Embedded Software.
    • entries: [frozendict({'id': 'BSI', 'description': 'The changes, compared to the preceding certification, consist of changes in the guidance and adding the ACL v.2.07.003 library.'}), frozendict({'id': 'BSI-DSZ-CC-0782-V5-2020 (Ausstellungsdatum / Certification Date 26.11.2020, gültig bis / valid until 25.11.2025) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target', 'description': 'forerunner, a variety of penetration tests have been renewed and the respective guidance documentation has been updated.'}), frozendict({'id': 'BSI-DSZ-CC-0782-V4-2018', 'description': 'forerunner, a new asymmetric crypto library is included together with related adjustments regarding the respective guidance documentation.'}), frozendict({'id': 'BSI-DSZ-CC-0782-V3-2017 (Ausstellungsdatum / Certification Date 05.09.2017, gültig bis / valid until 04.09.2022)', 'description': ') is included and related adjustments regarding crypto security functionality.'}), frozendict({'id': 'BSI-DSZ-CC-0782-V2-2015', 'description': 'Security'}), frozendict({'id': 'Eine', 'description': 'for composition Version 5 dated 20.03.2014 in addition to the latest certification report / maintenance report.'}), frozendict({'id': 'BSI-DSZ-CC-0782-2012-MA-01 (Ausstellungsdatum / Certification Date 05.09.2013)', 'description': 'Controller'}), frozendict({'id': 'BSI-DSZ-CC-0782-2012 (Ausstellungsdatum / Certification Date 11.09.2012)', 'description': 'Security'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 25.11.2025
    • product: Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 or v2.07.003 or v2.09.002, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003 or v2.09.002, and Toolbox v1.02.013 or v2.07.003 or v2.09.002 libraries and with specific IC dedicated software (firmware)
    • protection_profile: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte07/0782V6a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte07/0782V6b_pdf.pdf?__blob=publicationFile&v=2
  • product: Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 or …
  • subcategory: ICs, Cryptolib
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/0782.html
  • vendor: Infineon Technologies AG
protection_profiles
pdf_data/report_filename anssi-cc-2017_53fr.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2017/53
    • cert_item: S3D350A /S3D300A /S3D264A /S3D232A /S3D200A /S3K350A /S3K300A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure RSA and ECC Library including specific IC Dedicated software
    • cert_item_version: S3D350A/S3D300A/S3D264A/S3D232A/S3D200A/S3K350A/S3K300A_rev2_SW10- 07-10-10-100_GU14-14-003-09-10-21-12-08-00
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC”, “Loader dedicated for usage in Secured Environment only” et “Loader dedicated for usage by authorized users only
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2017/11: 3
    • ANSSI-CC-2017/53: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
pdf_data/report_keywords/cc_claims
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 3
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 10
pdf_data/report_keywords/pq_crypto
pdf_data/report_keywords/hash_function
pdf_data/report_keywords/crypto_scheme
pdf_data/report_keywords/crypto_protocol
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 14
pdf_data/report_keywords/cipher_mode
pdf_data/report_keywords/ecc_curve
pdf_data/report_keywords/crypto_engine
pdf_data/report_keywords/tls_cipher_suite
pdf_data/report_keywords/crypto_library
pdf_data/report_keywords/vulnerability
pdf_data/report_keywords/side_channel_analysis
pdf_data/report_keywords/technical_report_id
pdf_data/report_keywords/device_model
pdf_data/report_keywords/tee_name
pdf_data/report_keywords/os_name
pdf_data/report_keywords/cplc_data
pdf_data/report_keywords/ic_data_group
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_keywords/javacard_version
pdf_data/report_keywords/javacard_api_const
pdf_data/report_keywords/javacard_packages
pdf_data/report_keywords/certification_process
pdf_data/report_metadata
  • /CreationDate: D:20170904142818+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.025
  • /ModDate: D:20170911162916+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 713542
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename anssi-cible-cc-2017_53en.pdf.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084: 1
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL5: 6
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_ARV: 1
    • ADV_FSP: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_VAN: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 13
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 13
    • FCS_CKM.1: 26
    • FCS_CKM.2: 4
    • FCS_CKM.4: 17
    • FCS_COP: 51
    • FCS_COP.1: 21
    • FCS_RNG: 17
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF: 14
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 13
    • FDP_ITC.2: 13
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 14
    • FDP_SDI: 1
    • FDP_SDI.1: 2
    • FDP_SDI.2: 8
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 32
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 5
    • O.ECC: 2
    • O.ECDH: 5
    • O.ECDSA: 4
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.RSA: 8
    • O.SHA: 6
    • O.TDES: 7
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 18
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 30
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 13
      • Triple-DES: 6
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 30
    • ECDH:
      • ECDH: 15
    • ECDSA:
      • ECDSA: 21
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 6
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA512: 5
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 8
  • TRNG:
    • DTRNG: 37
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 26
    • malfunction: 13
    • physical tampering: 3
  • SCA:
    • DPA: 8
    • Leak-Inherent: 23
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 7
    • physical probing: 9
    • side channel: 2
    • side-channel: 4
    • timing attack: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 5
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
  • ICVersion:
    • IC Version: 1
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 5
  • CC:
    • CCMB-2017-04-001: 3
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 3
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 180-3: 6
    • FIPS197: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /CreationDate: D:20170522222620+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20170911162903+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title:
  • pdf_file_size_bytes: 1236724
  • pdf_hyperlinks: http://www.ecc-brainpool.org/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 110
state/report/convert_ok True False
state/report/download_ok True False
state/report/extract_ok True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok True False
state/st/download_ok True False
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different