This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries and with specific IC dedicated software (firmware) BSI-DSZ-CC-0951-2015 |
IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware v80.505.04.1, optional CryptoSuite v04.05.007, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents BSI-DSZ-CC-1206-V2-2024 |
|
---|---|---|
name | Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries and with specific IC dedicated software (firmware) | IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware v80.505.04.1, optional CryptoSuite v04.05.007, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents |
not_valid_before | 2015-11-11 | 2024-03-20 |
not_valid_after | 2020-11-11 | 2029-03-20 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0951b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V2b_pdf.pdf |
status | archived | active |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0951a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V2a_pdf.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1206V2c_pdf.pdf |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 13859d8dbf2496e57d575daf028e80f404884cb386d6be798217f926d10d8eec |
state/cert/txt_hash | None | 7b70cec56dbfcbe0bfe87c8c8549ea6612ac9fda7591214dfd3058d3e6318006 |
state/report/pdf_hash | 90ba35872c8182062b74e33b24cab1d6ab974dc9ecc0fc0fcff3bd5c1a8bec36 | 3e46c54172030caf6dc1629c8f3eaa72052ae2484c62ecefbd18d2501005bef4 |
state/report/txt_hash | 8a90ae08658412ab16fb7201f0180832c140a1cf7e793a750d342c168edb267f | 287780ac7b2a3f681759dde8860fa5abde743cd35a6f85a978e87eaf862417e4 |
state/st/pdf_hash | b1decb1673e0a3794bdb2ed541e9124c1d3ca4513b4947b0eb36f62e2d1f7cbf | 9f20fe870f838a6c378d130557cab3f555f977221c00a3dbdec9c0b46e85971c |
state/st/txt_hash | 1a762c45d8d5500cb73cfaf450f0b5f9a99908f7e9a2fd2f02263ce4df6d507b | 816c87c9a440bbd8772104b86ac098268f0528c956c3f6c915dafb57097cf79b |
heuristics/cert_id | BSI-DSZ-CC-0951-2015 | BSI-DSZ-CC-1206-V2-2024 |
heuristics/extracted_versions | 1.01, 2.03.008 | 02.01.0040, 1.1.1, 04.05.007, 1.1.2, 80.505.04.1, 04.05.0040, 06.10.0002 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-0951-V2-2017, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1091-2018 | BSI-DSZ-CC-1206-V3-2024 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0891-2015 | BSI-DSZ-CC-1206-2023 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1092-2020, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-0951-V4-2019, BSI-DSZ-CC-0951-V2-2017, BSI-DSZ-CC-0951-V3-2018, BSI-DSZ-CC-0951-V5-2021, BSI-DSZ-CC-1084-2019, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1091-2018 | BSI-DSZ-CC-1206-V3-2024 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 | BSI-DSZ-CC-1206-2023 |
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1091-2018 | None |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-1032-2018, BSI-DSZ-CC-1090-2018, BSI-DSZ-CC-1028-2017, BSI-DSZ-CC-1091-2018 | None |
pdf_data/cert_filename | None | 1206V2c_pdf.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0951a_pdf.pdf | 1206V2a_pdf.pdf |
pdf_data/report_frontpage/DE/cc_security_level | Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement | Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 valid until: 19 March 2029 |
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0951-2015 | BSI-DSZ-CC-1206-V2-2024 |
pdf_data/report_frontpage/DE/cert_item | Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries and with specific IC dedicated software (firmware | IFX_CCI_000068h, IFX_CCI_000080h design step G12 with firmware v80.505.04.1, optional CryptoSuite v04.05.007, optional HSL v04.05.0040, optional UMSLC v02.01.0040, optional NRG™ v06.10.0002, optional Ascon-128 MISE v1.1.2, optional SHA256 MISE v1.1.1 and user guidance documents |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 6 | 1 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 3 | 1 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 7 | 4 |
pdf_data/report_keywords/asymmetric_crypto/FF |
|
|
pdf_data/report_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 1 | 3 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 | 4 | 3 |
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_ARC | 1 | 3 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 4 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 6 | 5 |
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 2 | 4 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 | 7 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 | 4 | 3 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 9 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 10 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 8 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL6 | 3 | 1 |
pdf_data/report_keywords/cc_sfr | |
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cipher_mode/CBC/CBC | 3 | 1 |
pdf_data/report_keywords/cipher_mode/ECB/ECB | 2 | 4 |
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_scheme/KA |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik | 3 | 5 |
pdf_data/report_keywords/hash_function/SHA |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-2 | 24 | 1 |
pdf_data/report_keywords/javacard_api_const | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 3 | 12 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 26 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 4 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 37 | 2 | 1 |
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/standard_id/FIPS/FIPS 186-4 | 1 | 6 |
pdf_data/report_keywords/standard_id/FIPS/FIPS180-4 | 2 | 4 |
pdf_data/report_keywords/standard_id/FIPS/FIPS186-4 | 4 | 7 |
pdf_data/report_keywords/standard_id/FIPS/FIPS197 | 3 | 4 |
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/standard_id/PKCS |
|
|
pdf_data/report_keywords/standard_id/PKCS/PKCS #1 | 1 | 6 |
pdf_data/report_keywords/standard_id/PKCS/PKCS#1 | 1 | 3 |
pdf_data/report_keywords/standard_id/RFC |
|
|
pdf_data/report_keywords/standard_id/RFC/RFC5639 | 5 | 2 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 8 | 5 |
pdf_data/report_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 15 | 1 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 8 | 1 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 19 | 15 |
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | Federal Office for Information Security |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Security Controller M5073 G11 with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries and with specific IC dedicated software (firmware), Infineon Technologies AG" | "Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG" |
pdf_data/report_metadata//Subject | Common Criteria Certification | Common Criteria, Certification, Zertifizierung, Smartcard, Security IC, Infineon Technologies AG |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0951-2015 | Certification Report BSI-DSZ-CC-1206-V2-2024 |
pdf_data/report_metadata/pdf_file_size_bytes | 1421232 | 477448 |
pdf_data/report_metadata/pdf_number_of_pages | 46 | 34 |
pdf_data/st_filename | 0951b_pdf.pdf | 1206V2b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 19 | 16 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 7 | 6 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 23 | 5 |
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 10 | 2 |
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.AES | 7 | 3 |
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 | 4 | 1 |
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 | 4 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 | 3 | 4 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.3 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 6 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.5 | 3 | 1 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.5 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 4 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 | 11 | 4 |
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.3 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL | 2 | 3 |
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD | 2 | 3 |
pdf_data/st_keywords/cc_sar/ASE/ASE_INT | 2 | 10 |
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ | 2 | 4 |
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ | 2 | 30 |
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD | 2 | 4 |
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS | 2 | 6 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 3 | 1 |
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.3 | 4 | 2 |
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.2 | 3 | 1 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 3 | 1 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6 | 1 | 2 |
pdf_data/st_keywords/cc_security_level/EAL/EAL6 | 7 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented | 4 | 1 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 10 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 41 | 22 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 21 | 20 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 22 | 26 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 61 | 51 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 21 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 9 | 26 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 13 | 11 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 6 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 21 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 14 | 8 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 19 | 6 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDC.1 | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 16 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 26 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 9 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 8 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 19 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 20 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 15 | 5 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 11 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 20 | 8 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 13 | 6 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 24 | 12 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 11 | 5 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 6 | 4 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 9 | 3 |
pdf_data/st_keywords/cipher_mode/CFB/CFB | 1 | 3 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 9 | 7 |
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA |
|
|
pdf_data/st_keywords/ecc_curve/NIST |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-2 | 64 | 3 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 5 | 1 |
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 | 5 | 1 |
pdf_data/st_keywords/javacard_api_const | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RNG | 9 | 41 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 12 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 10 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 8 | 1 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 | 3 | 7 |
pdf_data/st_keywords/standard_id/NIST |
|
|
pdf_data/st_keywords/standard_id/NIST/SP 800-38A | 6 | 5 |
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/standard_id/RFC/RFC 5639 | 2 | 3 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 39 | 30 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 12 | 4 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 8 | 7 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 23 | 9 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller | Urian Rainer (IFAG DSS SQM PS CERT) |
pdf_data/st_metadata//Keywords | Taiwan, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, 90nm | Infineon |
pdf_data/st_metadata//Title | Public Security Target Lite | IFX_CCI_00068h Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 1509157 | 2179969 |
pdf_data/st_metadata/pdf_number_of_pages | 121 | 59 |
dgst | 429a73f9bb0ca435 | bff164cedfe33f61 |