This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V3-2020 |
Infineon Smart Card IC (Security Controller)SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software BSI-DSZ-CC-0482-2008 |
|
---|---|---|
name | Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software | Infineon Smart Card IC (Security Controller)SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software |
not_valid_before | 2020-07-24 | 2008-05-27 |
not_valid_after | 2025-07-24 | 2019-09-01 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V3b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482b.pdf |
status | active | archived |
security_level | ALC_FLR.1, EAL6+ | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V3a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482a.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V3c_pdf.pdf | None |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 1, 29), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma2.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 3, 5), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-a15, SLE66CLX800PEM / m1580-a15, SLE66CLX800PES / m1582-a15, SLE66CX800PE / m1599-a15, SLE66CLX360PE / m1587-a15, SLE66CLX360PEM / m1588-a15, SLE66CLX360PES / m1589-a15 all with optional libraries RSA V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma3.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 4, 15), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE /m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14 all with optional libraries RSA V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma5.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 4, 15), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-a15, SLE66CLX800PEM / m1580-a15, SLE66CLX800PES / m1582-a15, SLE66CX800PE / m1599-a15, SLE66CLX360PE / m1587-a15, SLE66CLX360PEM / m1588-a15, SLE66CLX360PES / m1589-a15, SLE66CLX180PE / m2080-a15, SLE66CLX180PEM / m2081-a15, SLE66CLX120PE / m2082-a15, SLE66CLX120PEM / m2083-a15 all with optional libraries RSA V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma4a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma4b.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 11, 4), 'maintenance_title': 'SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14,SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14,SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14,SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0482_ma1.pdf', 'maintenance_st_link': None}) | |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | 91521084ba8e15e7d98f8919450e3c73acd6882fe5fec8e911c183f690ed4c3b | None |
state/cert/txt_hash | 95062e6cc8ee24b042a35d7224cca6bece2515a5a57e27d76d01e8d080a31de3 | None |
state/report/pdf_hash | 32f8e703ac9215fbd720ec60b0c08f3b40fa1168fa57be99be2426ba1027e064 | 49a8bf500120a178469f8a0390381bb62c6b743b3c41230026a67444861d3a39 |
state/report/txt_hash | 9f2024a3d415b9bb66c0e2b6a28675535f27e1ba1a2ed53550a8032d3bf0471f | aae5a897dd4f7623729bdc6fea1fa18748100291cd62f0e16067a1e4c40d2569 |
state/st/pdf_hash | 1aa260e66d92d73085da23b23da315037bae1d8fbde83bd82a76c4d542039336 | e5143c1700564ff257a88b954adfbdee27215718772251525d51d2fdcc73afee |
state/st/txt_hash | 863b3f04156970129e1f8448df86b8cfbb7e10bde24b918094adfae7cf78966a | 27529cfbe07eea762fa288145bd4b4a55a2239f3a06629fc59091e07da931120 |
heuristics/cert_id | BSI-DSZ-CC-1025-V3-2020 | BSI-DSZ-CC-0482-2008 |
heuristics/cert_lab | BSI | None |
heuristics/extracted_versions | - | 1.1, 1.5 |
heuristics/indirect_transitive_cves | None | CVE-2021-3011 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-1025-V4-2021 | BSI-DSZ-CC-0523-2008, ANSSI-CC-2010/06, BSI-DSZ-CC-0626-2009, ANSSI-CC-2009/17, BSI-DSZ-CC-0568-2008, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0528-2008, BSI-DSZ-CC-0576-2009 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-1025-V2-2019 | BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0322-2005 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-1025-V4-2021, BSI-DSZ-CC-1025-V5-2023 | BSI-DSZ-CC-0523-2008, ANSSI-CC-2011/79, BSI-DSZ-CC-0528-2008, ANSSI-CC-2010/06, ANSSI-CC-2011/10, BSI-DSZ-CC-0593-2009, BSI-DSZ-CC-0626-2009, ANSSI-CC-2011/16, ANSSI-CC-2011/13, BSI-DSZ-CC-0568-2008, BSI-DSZ-CC-0665-2010, ANSSI-CC-2009/17, ANSSI-CC-2011/12, BSI-DSZ-CC-0630-2010, ANSSI-CC-2012/09, ANSSI-CC-2011/80, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0576-2009 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-1025-V2-2019, BSI-DSZ-CC-1025-2018 | BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003 |
heuristics/st_references/directly_referenced_by | None | BSI-DSZ-CC-0523-2008, ANSSI-CC-2010/06, KECS-ISIS-0118-2008, BSI-DSZ-CC-0626-2009, ANSSI-CC-2009/17, BSI-DSZ-CC-0665-2010 |
heuristics/st_references/directly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
heuristics/st_references/indirectly_referenced_by | None | BSI-DSZ-CC-0523-2008, ANSSI-CC-2010/06, KECS-ISIS-0118-2008, ANSSI-CC-2011/10, BSI-DSZ-CC-0626-2009, ANSSI-CC-2011/16, ANSSI-CC-2011/13, ANSSI-CC-2009/17, BSI-DSZ-CC-0665-2010, ANSSI-CC-2011/12, BSI-DSZ-CC-0630-2010 |
heuristics/st_references/indirectly_referencing | None | BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
pdf_data/cert_filename | 1025V3c_pdf.pdf | None |
pdf_data/cert_keywords |
|
None |
pdf_data/cert_metadata |
|
None |
pdf_data/report_filename | 1025V3a_pdf.pdf | 0482a.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 3 | 53 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 1 | 2 |
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 1 | 24 |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 6 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 3 | 2 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 1 | 5 |
pdf_data/report_keywords/cc_security_level/EAL/EAL6 | 1 | 3 |
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_sfr/FCS |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cipher_mode/CBC/CBC | 3 | 1 |
pdf_data/report_keywords/cipher_mode/ECB/ECB | 2 | 1 |
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/eval_facility/TUV |
|
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik | 5 | 2 |
pdf_data/report_keywords/randomness/RNG/RNG | 2 | 5 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 | 1 | 3 |
pdf_data/report_keywords/standard_id/BSI/AIS 26 | 1 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 2 | 4 |
pdf_data/report_keywords/standard_id/BSI/AIS 34 | 2 | 3 |
pdf_data/report_keywords/standard_id/BSI/AIS 35 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 36 | 3 | 2 |
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 6 |
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 2 | 12 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Infineon |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 3 | 30 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 1 | 5 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 29 | 10 |
pdf_data/report_metadata//CreationDate | D:20200727135937+02'00' | D:20080606110149+02'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, PP-0084, Security IC, Smart Card" | "SLE66CLX800PE / m1581-e13/a14, SLE66CLX800PEM / m1580-e13/a14, SLE66CLX800PES / m1582-e13/a14, SLE66CX800PE / m1599-e13/a14, SLE66CLX360PE / m1587-e13/a14, SLE66CLX360PEM / m1588-e13/a14, SLE66CLX360PES / m1589-e13/a14, SLE66CLX180PE / m2080-a14, SLE66CLX180PEM / m2081-a14, SLE66CLX120PE / m2082-a14, SLE66CLX120PEM / m2083-a14, all optional with RSA2048 V1.5 and ECC V1.1 and all with specific IC dedicated software, Infineon, BSI-DSZ-CC-0482-2008, Common Criteria" |
pdf_data/report_metadata//ModDate | D:20200728074309+02'00' | D:20080606120041+02'00' |
pdf_data/report_metadata//Producer | LibreOffice 6.2 | StarOffice 8 |
pdf_data/report_metadata//Subject | BSI-DSZ-CC-1025-V3-2020, Common Criteria, IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software | BSI-DSZ-CC-0482-2008 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-1025-V3 | Certification Report BSI-DSZ-CC-0482-2008 |
pdf_data/report_metadata/pdf_file_size_bytes | 888148 | 541629 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, https://www.sogis.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte | http://www.bsi.bund.de/ |
pdf_data/report_metadata/pdf_number_of_pages | 35 | 40 |
pdf_data/st_filename | 1025V3b_pdf.pdf | 0482b.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 17 | 46 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 6 | 9 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 19 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 9 | 4 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 6 | 19 |
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 4 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 6 | 3 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 3 | 2 |
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 32 | 49 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 6 | 7 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 31 | 30 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 25 | 45 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 27 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 23 | 15 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 16 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 26 | 24 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 26 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 14 | 3 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 13 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 12 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 11 | 4 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 17 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 20 | 16 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 15 | 9 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 6 | 9 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 20 | 6 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 15 | 3 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 17 | 7 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 5 | 2 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 31 | 26 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 9 | 6 |
pdf_data/st_keywords/cc_sfr/FTP |
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 21 | 3 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 | 4 | 3 |
pdf_data/st_keywords/certification_process/OutOfScope |
|
|
pdf_data/st_keywords/certification_process/OutOfScope/out of scope | 3 | 2 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 5 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 25 | 7 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/DFA | 7 | 4 |
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 12 | 15 |
pdf_data/st_keywords/side_channel_analysis/FI/malfunction | 1 | 3 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 7 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 13 | 11 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 6 | 4 |
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering | 1 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 13 | 10 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 4 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 29 | 11 |
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/vendor/Infineon |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 15 | 2 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 32 | 8 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Noller | Hans-Ulrich Buchmüller |
pdf_data/st_metadata//CreationDate | D:20200317140608+01'00' | D:20080603104126Z |
pdf_data/st_metadata//Creator | Microsoft® Word 2010 | Security Target_SLE66CLX800PEx+360PEx_Libs_1.2_05.doc - Microsoft Word |
pdf_data/st_metadata//Keywords | Infineon | Design Steps e13, a14, RSA, EC, ECC, libraries, Elliptic Curve, Security Target, contactless, Security Controller, public, document, resistance to attackers with high attack potential, Infineon |
pdf_data/st_metadata//ModDate | D:20200317140608+01'00' | D:20080606120105+02'00' |
pdf_data/st_metadata//Producer | Microsoft® Word 2010 | Acrobat PDFWriter 5.0 for Windows NT |
pdf_data/st_metadata/pdf_file_size_bytes | 1818755 | 358317 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.infineon.com/, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html, http://www.ietf.org/rfc/rfc5639.txt, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.osptalliance.org/resources/documentation | |
pdf_data/st_metadata/pdf_number_of_pages | 126 | 62 |
dgst | 56a9f36e765a96c9 | 189c8bc5499115b2 |