This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-2012 |
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 |
|
---|---|---|
name | Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software | Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software |
not_valid_before | 2012-09-05 | 2018-09-14 |
not_valid_after | 2019-09-01 | 2023-09-14 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V7b_pdf.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V7a_pdf.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V7c_pdf.pdf |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 6, 24), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829_ma1a_pdf.pdf', 'maintenance_st_link': None}) | |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | f1dbd4097e02ec79fa2993180b40000d518eeb43726e4386f1db1c09872bc5f4 |
state/cert/txt_hash | None | 849e4114033fcfcf29a6b6b4b7cb96e3a563aa5a7c291e342325d99882e5ca60 |
state/report/pdf_hash | c612a4e4a03364a599c924a20703c107b54e32289b1057453bbdfd51958a3c0e | 264649932f6805a7ce28eaa80ef4e26793fb414766f5f2d43bef87988a8774ae |
state/report/txt_hash | 2223602b87bfe5c7d8bc107cfa67b79061df9eeda58c1f23157114c411d3ce4d | 436c60584b39b6191aa5f0fba3c131306ceffa8fe01c091bf7f3bb13be52ed87 |
state/st/pdf_hash | 5640d1648931967eae59f8fdfec115c14673e5c9ffc9cdca7689932a1efb4a75 | 0d62fc9e8c2c38d1f526a581a4b5bfab73b6a0785115ed3999d3c1d970f6d4aa |
state/st/txt_hash | cdf3132511bdb9afcb540dc038bb07430cd4f185de2045a7dfcf431da3f10637 | b0b6acc7d1748091818730ff57b4d743202f53c28a95a01d7821c37b5d491588 |
heuristics/cert_id | BSI-DSZ-CC-0829-2012 | BSI-DSZ-CC-0827-V7-2018 |
heuristics/cpe_matches | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* | None |
heuristics/direct_transitive_cves | CVE-2017-15361 | None |
heuristics/extracted_versions | 1.02.013, 1.01 | - |
heuristics/indirect_transitive_cves | CVE-2017-15361 | None |
heuristics/related_cves | CVE-2017-15361 | None |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, ANSSI-CC-2013/55, ANSSI-CC-2014/12, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2015/25, ANSSI-CC-2013/64, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2013/33, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2013/32, ANSSI-CC-2013/34, CRP290, ANSSI-CC-2013/42, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 | BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0728-2011 | BSI-DSZ-CC-0827-V6-2017 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2015/02, ANSSI-CC-2015/38, ANSSI-CC-2015/40, ANSSI-CC-2015/04, ANSSI-CC-2015/15, ANSSI-CC-2014/11, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0904-2015, ANSSI-CC-2013/55, ANSSI-CC-2015/39, ANSSI-CC-2016/75, ANSSI-CC-2014/12, ANSSI-CC-2015/03, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2015/25, ANSSI-CC-2013/64, ANSSI-CC-2013/35, ANSSI-CC-2014/48, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2015/01, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2015/41, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2015/08, ANSSI-CC-2013/32, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2015/37, ANSSI-CC-2013/34, CRP290, ANSSI-CC-2013/42, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/03, ANSSI-CC-2014/06, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2016/04, ANSSI-CC-2014/86, ANSSI-CC-2014/13, ANSSI-CC-2015/30 | BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V8-2020 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 | BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017 |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, ANSSI-CC-2014/12, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2013/32, ANSSI-CC-2013/34, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 | None |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012 | None |
heuristics/st_references/indirectly_referenced_by | ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, ANSSI-CC-2014/12, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2013/32, ANSSI-CC-2013/34, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 | None |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011 | None |
pdf_data/cert_filename | None | 0827V7c_pdf.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | 0829a_pdf.pdf | 0827V7a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0829-2012 | BSI-DSZ-CC-0827-V7-2018 |
pdf_data/report_frontpage/DE/cert_item | Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software | Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECC/ECC | 4 | 8 |
pdf_data/report_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 4 | 2 |
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 2 | 11 |
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 | 2 | 11 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 | 3 | 2 |
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.4 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 | 3 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 7 | 5 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 | 3 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 6 | 4 |
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 3 | 1 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 6 | 8 |
pdf_data/report_keywords/cc_security_level/EAL/EAL6 | 4 | 1 |
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/cipher_mode | |
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_scheme | |
|
pdf_data/report_keywords/ecc_curve | |
|
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik | 4 | 5 |
pdf_data/report_keywords/hash_function/SHA |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2/SHA-2 | 24 | 1 |
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 1 | 2 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/FI/DFA | 5 | 2 |
pdf_data/report_keywords/side_channel_analysis/SCA/DPA | 6 | 2 |
pdf_data/report_keywords/side_channel_analysis/SCA/SPA | 5 | 2 |
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 26 | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI/AIS 35 | 1 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS31 | 1 | 2 |
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 5 | 19 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES | 3 | 6 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 3 | 2 |
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 3 | 10 |
pdf_data/report_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor/GD |
|
|
pdf_data/report_keywords/vendor/GD/G&D | 1 | 2 |
pdf_data/report_keywords/vendor/Infineon/Infineon | 14 | 23 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 18 | 8 |
pdf_data/report_metadata//CreationDate | D:20120912093345+02'00' | D:20181016125133+02'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software, Infineon Technologies AG" | "Common Criteria, Certification, Zertifizierung, SecurityIC, Infineon, 0827-V7, BSI-CC, M990x" |
pdf_data/report_metadata//ModDate | D:20120912093725+02'00' | D:20181019105320+02'00' |
pdf_data/report_metadata//Producer | LibreOffice 3.5 | LibreOffice 5.2 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0829-2012 | Certification Report BSI-DSZ-CC-0827-V7-2018 |
pdf_data/report_metadata/pdf_file_size_bytes | 1362115 | 1018622 |
pdf_data/report_metadata/pdf_number_of_pages | 46 | 34 |
pdf_data/st_filename | 0829b_pdf.pdf | 0827V7b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 16 | 78 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 4 | 8 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 12 | 17 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 5 | 7 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 1 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 | 1 | 2 |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 3 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 5 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 24 | 21 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 34 | 45 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 24 | 35 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 58 | 139 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 28 | 39 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 13 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 29 | 25 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 22 | 19 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 18 | 29 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 18 | 29 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 11 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 7 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 20 | 17 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 21 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 16 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 19 | 18 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 25 | 14 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 11 | 12 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 36 | 34 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 7 | 8 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 4 | 16 |
pdf_data/st_keywords/cipher_mode/CFB/CFB | 5 | 9 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 4 | 11 |
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 4 |
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-2 | 61 | 4 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RNG | 9 | 17 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 5 | 8 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 10 | 5 |
pdf_data/st_keywords/standard_id/BSI/AIS32 | 5 | 4 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 | 2 | 1 |
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/RFC/RFC3447 | 11 | 14 |
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 24 | 51 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES | 17 | 39 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 8 | 12 |
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
|
pdf_data/st_keywords/technical_report_id/BSI |
|
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 7 | 12 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 16 | 22 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller | Urian Rainer (IFAG CCS SQM PS) |
pdf_data/st_metadata//CreationDate | D:20120828132014 | D:20180829133914+02'00' |
pdf_data/st_metadata//Creator | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata//Keywords | Dresden, Burlington, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries, CCv3.1 | Infineon |
pdf_data/st_metadata//ModDate | D:20120828132014 | D:20180829133914+02'00' |
pdf_data/st_metadata//Producer | Microsoft® Office Word 2007 | Microsoft® Word 2010 |
pdf_data/st_metadata/pdf_file_size_bytes | 889908 | 1401146 |
pdf_data/st_metadata/pdf_number_of_pages | 85 | 104 |
dgst | 6de5e7a68582ea80 | 168584cce12fa52e |