This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 ANSSI-CC-2016/24 |
Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 ANSSI-CC-2017/76 |
|
---|---|---|
name | Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 |
not_valid_before | 2016-05-23 | 2017-12-18 |
not_valid_after | 2021-05-23 | 2027-03-22 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2016-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_76en.pdf |
status | archived | active |
manufacturer | Gemalto | gemalto |
manufacturer_web | https://www.gemalto.com/ | None |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-24.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_76fr.pdf |
cert_link | None | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017_76-s02.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Privilege Directed Content Protection, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/authpp[1].pdf', 'pp_ids': None}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 3, 22), 'maintenance_title': 'Reassessment report: ANSSI-CC-2017/76-S02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_76-s02.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 3, 23), 'maintenance_title': 'Maintenance report: ANSSI-CC-2017/76-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_76-m01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 5, 3), 'maintenance_title': 'Reassessment report: ANSSI-CC-2017/76-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_76-S01.pdf', 'maintenance_st_link': None}) | |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | None | 279171167c0ed6a8c43dcfc18da13299583c45eede42d0688a54b5293fc83935 |
state/cert/txt_hash | None | 677effbf4e1bd9c0b1d5feb32ef6306485ded58ddc1696708d65e5374d814f67 |
state/report/pdf_hash | 30dea023a9917d98b161550b494270b455c2a5e2926512175f70e9a748bc323d | f4439da643bca2aa89c20fb20050411f2796bcda2bb901ba3ad9bd4a002e894b |
state/report/txt_hash | 1d9fda6501d56f9964b149f1af9ad45a688c8e492202906e1fa24372df94c0b7 | 747c503b3e379dbc6897b28a02cfcedd3808f83fca5970f4bec3b83eb3c15a2e |
state/st/pdf_hash | 7903c404de0848263e1d2c1511d9a763f311e8373a7526274d325b7f4d83bd8d | c3057f999c6b0e15f56010052befb1905b97dc5c7f22b057b797a5b517670a8a |
state/st/txt_hash | 3773a168f362110369c751c34d08b9e13cec025d79becf88ba5592bcfe75da07 | a1259b839ff250562a70420f24226fb4036f55f53742725352ad87662fa0f156 |
heuristics/cert_id | ANSSI-CC-2016/24 | ANSSI-CC-2017/76 |
heuristics/extracted_versions | 1.0 | 4.0.1 |
heuristics/report_references/directly_referenced_by | None | ANSSI-CC-2017/81, ANSSI-CC-2020/33, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2018/21, ANSSI-CC-2017/83, ANSSI-CC-2018/11, ANSSI-CC-2017/82, ANSSI-CC-2018/24 |
heuristics/report_references/directly_referencing | ANSSI-CC-2016/06, BSI-DSZ-CC-0964-2015 | ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016 |
heuristics/report_references/indirectly_referenced_by | None | ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2018/32, ANSSI-CC-2020/43, ANSSI-CC-2018/58, ANSSI-CC-2018/53, ANSSI-CC-2019/31, ANSSI-CC-2020/44, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2018/56, ANSSI-CC-2018/56v2, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/45, ANSSI-CC-2019/07, ANSSI-CC-2017/81, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0814-2012, ANSSI-CC-2016/06, ANSSI-CC-2015/73, BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015, BSI-DSZ-CC-0907-2013 | ANSSI-CC-2017/07, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
|
heuristics/scheme_data/cert_id | 2016/24 | 2017/76 |
heuristics/scheme_data/description | Le produit certifié est la carte à puce composée de l’« Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 » développé par GEMALTO et INFINEON. Le produit se présente sous la forme d’une carte à puce au format ISO 7816 fonctionnant en mode contact (standard ISO 7816-3) et/ou sans-contact (standard ISO 14443) ; le microcontr | Le produit certifié est la « Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12, JavaCard version 3.0.4, GP version 2.2.1 » développée par les sociétés GEMALTO et INFINEON TECHNOLOGIES AG. Le produit est destiné à héberger et exécuter une ou plusieurs applications, dites applets dans la terminologie JavaCard. Ces applications peuvent revêtir u |
heuristics/scheme_data/developer | Gemalto / Infineon | Gemalto, Infineon Technologies AG |
heuristics/scheme_data/enhanced |
|
|
heuristics/scheme_data/enhanced/cc_version | Critères Communs version 3.1r4 | Critères Communs version 3.1r5 |
heuristics/scheme_data/enhanced/cert_id | 2016/24 | 2017/76 |
heuristics/scheme_data/enhanced/certification_date | 23/05/2016 | 18/12/2017 |
heuristics/scheme_data/enhanced/developer | Gemalto / Infineon | Gemalto, Infineon Technologies AG |
heuristics/scheme_data/enhanced/protection_profile | PP-SSCD part 2, PP-SSCD part 3, PP-SSCD part 4, PP-SSCD part 5, PP-SSCD part 6 | SUN Java Card System Protection - Profile Open Configuration, v.3.0 |
heuristics/scheme_data/enhanced/report_link | https://cyber.gouv.fr/sites/default/files/2016/05/anssi-cc-2016-24.pdf | https://cyber.gouv.fr/sites/default/files/2017/12/anssi-cc-2017_76fr.pdf |
heuristics/scheme_data/enhanced/target_link | https://cyber.gouv.fr/sites/default/files/2016/05/cible_2016-24.pdf | https://cyber.gouv.fr/sites/default/files/2017/12/anssi-cible-2017_76-m01en.pdf |
heuristics/scheme_data/product | Applet IAS Classic V3 sur plateforme JavaCard ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 |
heuristics/scheme_data/url | https://cyber.gouv.fr/produits-certifies/applet-ias-classic-v3-sur-plateforme-javacard-ouverte-multiapp-essential-v10-0 | https://cyber.gouv.fr/produits-certifies/plateforme-javacard-multiapp-v401-pace-en-configuration-ouverte-masquee-sur-le |
heuristics/st_references/directly_referenced_by | None | ANSSI-CC-2018/21 |
heuristics/st_references/directly_referencing | BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 | BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referenced_by | None | ANSSI-CC-2018/21 |
heuristics/st_references/indirectly_referencing | BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0926-2014 | BSI-DSZ-CC-0891-V2-2016 |
pdf_data/cert_filename | None | certificat-anssi-cc-2017_76-s02.pdf |
pdf_data/cert_keywords | None |
|
pdf_data/cert_metadata | None |
|
pdf_data/report_filename | ANSSI-CC-2016-24.pdf | ANSSI-CC-2017_76fr.pdf |
pdf_data/report_frontpage/FR/cc_version | Critères Communs version 3.1 révision 4 | Critères Communs version 3.1 révision 5 |
pdf_data/report_frontpage/FR/cert_id | ANSSI-CC-2016/24 | ANSSI-CC-2017/76 |
pdf_data/report_frontpage/FR/cert_item | Applet IAS Classic V3 sur plateforme Java Card ouverte MultiApp Essential V1.0 embarquée sur le composant M7794 A12 et G12 | Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 |
pdf_data/report_frontpage/FR/cert_item_version | Version de l’application IAS Classic : 3.4.e Version de la plateforme Java Card MultiApp Essential : 1.0 | JavaCard version 3.0.4, GP version 2.2.1 |
pdf_data/report_frontpage/FR/cert_lab | Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France | Serma Safety & Security 14, rue Galilée, CS 10055, 33615 Pessac Cedex, France |
pdf_data/report_frontpage/FR/developer | Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France | Gemalto 6, rue de la Verrerie CS20001 92197 Meudon Cedex, France Infineon Technologies AG Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6, rue de la Verrerie CS20001 92197 Meudon Cedex, France |
pdf_data/report_frontpage/FR/match_rules | Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables | Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables |
pdf_data/report_frontpage/FR/ref_protection_profiles | PP-SSCD part 2], version 2.0.1 - PP for Secure Signature Creation Device – Part 2 : Device with key generation. [PP-SSCD part 3], version 1.0.2 - PP for Secure Signature Creation Device – Part 3 : Device with key import. [PP-SSCD part 4], version 1.0.1 - PP for Secure Signature Creation Device – Part 4 : Extension for device with key generation and trusted communication with certificate generation application. [PP-SSCD part 5], version 1.0.1 - PP for Secure Signature Creation Device – Part 5 : Extension for device with key generation and trusted communication with signature creation application. [PP-SSCD part 6], version 1.0.4 - PP for Secure Signature Creation Device – Part 6 : Extension for device with key import and trusted communication with signature creation application | SUN Java Card System Protection - Profile Open Configuration, version 3.0 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE | 1 | 4 |
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE | 1 | 3 |
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol | |
|
pdf_data/report_keywords/eval_facility/Serma/SERMA | 1 | 2 |
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/javacard_packages | |
|
pdf_data/report_keywords/javacard_version | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Gemalto/Gemalto | 3 | 6 |
pdf_data/report_keywords/vendor/Infineon |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 2 | 1 |
pdf_data/report_metadata |
|
|
pdf_data/report_metadata//Author | Christian Benardeau | |
pdf_data/report_metadata//CreationDate | D:20171221143847+01'00' | |
pdf_data/report_metadata//Creator | PDFCreator Version 1.2.1 | Acrobat PDFMaker 11 pour Word |
pdf_data/report_metadata//Keywords | ANSSI-CC-CER-F-07.026 | |
pdf_data/report_metadata//ModDate | D:20171221143850+01'00' | |
pdf_data/report_metadata//Producer | GPL Ghostscript 9.02 | Adobe PDF Library 11.0 |
pdf_data/report_metadata//Subject | Plateforme JavaCard MultiApp V4.0.1 - PACE en configuration ouverte masquée sur le composant M7892 G12 | |
pdf_data/report_metadata//Title | ANSSI-CC-2016-24 | ANSSI-CC-2017/76 |
pdf_data/report_metadata/pdf_file_size_bytes | 276790 | 446602 |
pdf_data/report_metadata/pdf_hyperlinks | mailto:[email protected], http://www.sogis.org/, http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/ | |
pdf_data/report_metadata/pdf_number_of_pages | 18 | 19 |
pdf_data/st_filename | cible_2016-24.pdf | anssi-cible-cc-2017_76en.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH | 1 | 10 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 2 | 5 |
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_claims/A |
|
|
pdf_data/st_keywords/cc_claims/OE |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 | 2 | 9 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 2 | 9 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 2 | 6 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 2 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 14 | 51 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 5 | 30 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 | 2 | 3 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 2 | 12 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 8 | 27 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 8 | 38 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 2 | 32 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 | 2 | 4 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC | 4 | 40 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF | 4 | 34 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 6 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 9 | 13 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC | 2 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 4 | 12 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 4 | 17 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP | 1 | 95 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 | 1 | 10 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT | 3 | 7 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL | 6 | 25 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU | 5 | 65 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID | 4 | 41 |
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 | 6 | 18 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA | 14 | 91 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 3 | 11 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 5 | 15 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD | 4 | 41 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 8 | 17 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 11 | 27 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS | 5 | 4 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 | 7 | 15 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 2 | 16 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 2 | 17 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 2 | 9 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 | 3 | 15 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC | 13 | 18 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 | 2 | 5 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 | 4 | 1 |
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 | 4 | 1 |
pdf_data/st_keywords/certification_process | |
|
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_protocol | |
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC | 2 | 14 |
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 | 1 | 5 |
pdf_data/st_keywords/ic_data_group | |
|
pdf_data/st_keywords/javacard_api_const | |
|
pdf_data/st_keywords/javacard_packages | |
|
pdf_data/st_keywords/javacard_version | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 1 | 21 |
pdf_data/st_keywords/randomness/RNG/RNG | 2 | 13 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 1 | 9 |
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering | 4 | 1 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 1 | 2 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 1 | 5 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 | 2 | 7 |
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 | 2 | 1 |
pdf_data/st_keywords/standard_id/SCP |
|
|
pdf_data/st_keywords/standard_id/SCP/SCP03 | 1 | 6 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 31 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES | 4 | 14 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 2 | 20 |
pdf_data/st_keywords/vendor/Gemalto/Gemalto | 339 | 131 |
pdf_data/st_keywords/vendor/Infineon/Infineon | 4 | 7 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//CreationDate | D:20160504105208+02'00' | D:20171122164640+01'00' |
pdf_data/st_metadata//Keywords | Security Target, CC, eTravel | Security Target, CC |
pdf_data/st_metadata//ModDate | D:20160504105208+02'00' | D:20171221165435+01'00' |
pdf_data/st_metadata//Subject | MRTD | |
pdf_data/st_metadata//Title | eTravel v1.0 Security Target MAÏA3 | |
pdf_data/st_metadata/pdf_file_size_bytes | 1225698 | 2750840 |
pdf_data/st_metadata/pdf_number_of_pages | 52 | 117 |
dgst | 89df7836e74b174e | 36f883150757f19a |