This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V3-2020 |
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware) BSI-DSZ-CC-0782-V2-2015 |
|
---|---|---|
name | Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software | Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware) |
not_valid_before | 2020-07-24 | 2015-11-03 |
not_valid_after | 2025-07-24 | 2020-11-03 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V3b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V2b_pdf.pdf |
status | active | archived |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V3a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V2a_pdf.pdf |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1025V3c_pdf.pdf | None |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | 91521084ba8e15e7d98f8919450e3c73acd6882fe5fec8e911c183f690ed4c3b | None |
state/cert/txt_hash | 95062e6cc8ee24b042a35d7224cca6bece2515a5a57e27d76d01e8d080a31de3 | None |
state/report/pdf_hash | 32f8e703ac9215fbd720ec60b0c08f3b40fa1168fa57be99be2426ba1027e064 | 7a74b9c22c4aa735d6f22d6ecbde5266db7fb45d507182f311ba9576ab4f5a36 |
state/report/txt_hash | 9f2024a3d415b9bb66c0e2b6a28675535f27e1ba1a2ed53550a8032d3bf0471f | e70f7ca492c33ec65a789e397fb74d099125d564afc3e2a574c25fb3ff7e5239 |
state/st/pdf_hash | 1aa260e66d92d73085da23b23da315037bae1d8fbde83bd82a76c4d542039336 | 61df2f82c1eeef8f21bb39f0e3be24e569b88d6754aa092ae047d453c48314b1 |
state/st/txt_hash | 863b3f04156970129e1f8448df86b8cfbb7e10bde24b918094adfae7cf78966a | defe49fe39cd16fd2b386f064e9a89ffecbf6865ad6f860a870f2f9564f77a78 |
heuristics/cert_id | BSI-DSZ-CC-1025-V3-2020 | BSI-DSZ-CC-0782-V2-2015 |
heuristics/cpe_matches | None | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves | None | CVE-2017-15361 |
heuristics/extracted_versions | - | 1.02.013, 1.01 |
heuristics/indirect_transitive_cves | None | CVE-2017-15361 |
heuristics/related_cves | None | CVE-2017-15361 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-1025-V4-2021 | BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0956-2016, ANSSI-CC-2017/05, BSI-DSZ-CC-0968-2016, ANSSI-CC-2016/66, ANSSI-CC-2017/09, ANSSI-CC-2016/81, NSCIB-CC-15-77633-CR, BSI-DSZ-CC-0976-2015, ANSSI-CC-2017/08, ANSSI-CC-2017/06, ANSSI-CC-2017/65, ANSSI-CC-2016/64, ANSSI-CC-2016/80, BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0938-2016, ANSSI-CC-2017/66, ANSSI-CC-2017/59, KECS-ISIS-0677-2015, ANSSI-CC-2016/70, KECS-ISIS-0676-2015 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-1025-V2-2019 | BSI-DSZ-CC-0782-2012 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-1025-V4-2021, BSI-DSZ-CC-1025-V5-2023 | BSI-DSZ-CC-0985-2018, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0956-2016, ANSSI-CC-2017/05, BSI-DSZ-CC-0968-2016, ANSSI-CC-2016/66, ANSSI-CC-2017/74, ANSSI-CC-2018/22, ANSSI-CC-2017/09, ANSSI-CC-2016/81, NSCIB-CC-15-77633-CR, BSI-DSZ-CC-0987-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0976-2015, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/08, BSI-DSZ-CC-0976-V4-2021, ANSSI-CC-2017/06, ANSSI-CC-2017/65, BSI-DSZ-CC-0782-V5-2020, ANSSI-CC-2016/64, ANSSI-CC-2016/80, BSI-DSZ-CC-0967-2016, NSCIB-CC-195748-CR, BSI-DSZ-CC-1243-2024, NSCIB-CC-196231-CR, KECS-ISIS-1139-2021, BSI-DSZ-CC-0938-2016, ANSSI-CC-2017/66, KECS-ISIS-1140-2021, KECS-ISIS-1113-2021, ANSSI-CC-2017/59, BSI-DSZ-CC-0976-V2-2018, ANSSI-CC-2018/27, KECS-ISIS-0677-2015, ANSSI-CC-2016/70, KECS-ISIS-0676-2015 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-1025-V2-2019, BSI-DSZ-CC-1025-2018 | BSI-DSZ-CC-0782-2012 |
heuristics/st_references/directly_referenced_by | None | ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09, BSI-DSZ-CC-0938-2016, ANSSI-CC-2016/67, ANSSI-CC-2017/06, BSI-DSZ-CC-0956-2016, NSCIB-CC-15-77633-CR, ANSSI-CC-2017/05, BSI-DSZ-CC-0968-2016, BSI-DSZ-CC-0976-2015, KECS-ISIS-0677-2015, BSI-DSZ-CC-0967-2016, KECS-ISIS-0676-2015 |
heuristics/st_references/indirectly_referenced_by | None | ANSSI-CC-2016/66, ANSSI-CC-2017/08, ANSSI-CC-2017/09, BSI-DSZ-CC-0938-2016, ANSSI-CC-2016/67, ANSSI-CC-2017/06, BSI-DSZ-CC-0956-2016, NSCIB-CC-15-77633-CR, ANSSI-CC-2017/05, BSI-DSZ-CC-0968-2016, BSI-DSZ-CC-0976-2015, KECS-ISIS-0677-2015, BSI-DSZ-CC-0967-2016, KECS-ISIS-0676-2015 |
pdf_data/cert_filename | 1025V3c_pdf.pdf | None |
pdf_data/cert_keywords |
|
None |
pdf_data/cert_metadata |
|
None |
pdf_data/report_filename | 1025V3a_pdf.pdf | 0782V2a_pdf.pdf |
pdf_data/report_frontpage/DE/cc_security_level | Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 | Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 SOGIS Recognition Agreement |
pdf_data/report_frontpage/DE/cc_version | PP conformant plus product specific extensions Common Criteria Part 2 extended | PP conformant plus product specific extensions Common Criteria Part 2 conformant extended |
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-1025-V3-2020 | BSI-DSZ-CC-0782-V2-2015 |
pdf_data/report_frontpage/DE/cert_item | IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software | Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware |
pdf_data/report_frontpage/DE/ref_protection_profiles | Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014 | Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 3 | 5 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 1 | 3 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 3 | 7 |
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 1 | 2 |
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 | 1 | 2 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 4 | 6 |
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 | 1 | 3 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 | 1 | 7 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 | 2 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 1 | 10 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 4 | 8 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 4 | 8 |
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/crypto_library | |
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik | 5 | 4 |
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 2 | 3 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 | 1 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 26 | 1 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 2 | 4 |
pdf_data/report_keywords/standard_id/BSI/AIS31 | 5 | 2 |
pdf_data/report_keywords/standard_id/FIPS |
|
|
pdf_data/report_keywords/standard_id/FIPS/FIPS186-4 | 4 | 5 |
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/standard_id/PKCS |
|
|
pdf_data/report_keywords/standard_id/PKCS/PKCS #1 | 1 | 3 |
pdf_data/report_keywords/standard_id/RFC/RFC5639 | 4 | 5 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 11 | 6 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES | 4 | 2 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 1 | 3 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 3 | 27 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 1 | 9 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 29 | 20 |
pdf_data/report_metadata//CreationDate | D:20200727135937+02'00' | D:20151112102347+01'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, PP-0084, Security IC, Smart Card" | "Common Criteria, Certification, Zertifizierung, Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software (firmware), Infineon Technologies AG" |
pdf_data/report_metadata//ModDate | D:20200728074309+02'00' | D:20151116111229+01'00' |
pdf_data/report_metadata//Producer | LibreOffice 6.2 | LibreOffice 4.2 |
pdf_data/report_metadata//Subject | BSI-DSZ-CC-1025-V3-2020, Common Criteria, IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software | Common Criteria Certification |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-1025-V3 | Certification Report BSI-DSZ-CC-0782-V2-2015 |
pdf_data/report_metadata/pdf_file_size_bytes | 888148 | 1394147 |
pdf_data/report_metadata/pdf_number_of_pages | 35 | 46 |
pdf_data/st_filename | 1025V3b_pdf.pdf | 0782V2b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 17 | 13 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 19 | 14 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 9 | 2 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 6 | 1 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 | 6 | 1 |
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/O/O.RND | 4 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_INT.3 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.5 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 | 3 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS | 3 | 2 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 | 11 | 12 |
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.3 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL | 9 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD | 4 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_INT | 19 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ | 9 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ | 45 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD | 8 | 2 |
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS | 16 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 3 | 1 |
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 5 | 3 |
pdf_data/st_keywords/cc_security_level/EAL/EAL6 | 131 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented | 128 | 5 |
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ | 128 | 4 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 3 | 5 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 12 | 11 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 76 | 24 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 32 | 34 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 6 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 31 | 24 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 114 | 58 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 25 | 28 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 47 | 13 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 16 | 28 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 27 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 26 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 26 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 14 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 13 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 | 2 | 3 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM | 29 | 3 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 12 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 11 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 17 | 21 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 20 | 22 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 15 | 17 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 17 | 25 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 11 | 12 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 31 | 36 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 9 | 8 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 14 | 4 |
pdf_data/st_keywords/cipher_mode/CFB/CFB | 6 | 5 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 16 | 4 |
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_scheme/KA |
|
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/randomness/PRNG/PRNG | 1 | 7 |
pdf_data/st_keywords/randomness/RNG/RND | 5 | 2 |
pdf_data/st_keywords/randomness/RNG/RNG | 25 | 10 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 3 | 12 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 12 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 7 | 9 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 13 | 10 |
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing | 2 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 6 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA/side-channel | 1 | 2 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 13 | 9 |
pdf_data/st_keywords/standard_id/BSI/AIS32 | 8 | 5 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 | 8 | 1 |
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 50 | 27 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 27 | 2 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 4 | 3 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 29 | 10 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id/BSI |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 15 | 10 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 22 | 17 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 32 | 8 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Noller | Hans-UlrichBuchmüller |
pdf_data/st_metadata//CreationDate | D:20200317140608+01'00' | D:20151021145115+02'00' |
pdf_data/st_metadata//Keywords | Infineon | Dresden, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0084, 90nm |
pdf_data/st_metadata//ModDate | D:20200317140608+01'00' | D:20151021145115+02'00' |
pdf_data/st_metadata/pdf_file_size_bytes | 1818755 | 1212364 |
pdf_data/st_metadata/pdf_number_of_pages | 126 | 96 |
dgst | 56a9f36e765a96c9 | 2d45405ac06dae61 |