Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

S3K200B/S3K170B/S3K140B 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software, Version S3K200B_20190930
ANSSI-CC-2019/51
S3NSEN4/S3NSEN3 32-bit RISC Microcontroller for Smart Card including specific IC Dedicated software (Revision 1)
ANSSI-CC-2019/29
name S3K200B/S3K170B/S3K140B 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software, Version S3K200B_20190930 S3NSEN4/S3NSEN3 32-bit RISC Microcontroller for Smart Card including specific IC Dedicated software (Revision 1)
not_valid_before 2020-01-09 2019-07-31
not_valid_after 2025-01-09 2025-12-09
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_51en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2019_29en.pdf
security_level EAL5+, AVA_VAN.5 ASE_TSS.2, EAL6+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_51.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-29fr.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2019_29-S01.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 9, 12), 'maintenance_title': 'Reassessment report: ANSSI-CC-2019/29-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2019-29-S01.pdf', 'maintenance_st_link': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None a5b9fee171184a4b396dc397962b965f7f4a4f61b6d6bc212a7746ea8d583984
state/cert/txt_hash None e3c0ceed8e788c9dc3182d6364546894adac7826bf57d4f31435c42174c326e0
state/report/pdf_hash 5c5018a01f5b0c42bac7182aff0b1dc290d413992c326a687a94963a547338b0 ccfa7077330a68cb198122a949c2ac134e6a7c604ade3f7dd60e5d5e08fc31b7
state/report/txt_hash 55fdeefbcca9179ca0e8c3fce76635f7cda3cb66fdc9795be6c53ed3af87ac90 e2667ad4fd7759df03a5e6a44cb27ac4e8e4c6c9e1398ecea489e2e9d961e730
state/st/extract_ok True False
state/st/pdf_hash c4ef95113e840896045f0a1bc91e9c99c6abb2f93cabacbb59689786bce3595c 57dc501f9fc006e3c3b8a43aeb64e4b35e7876fb82e6d824e79547b9643945ef
state/st/txt_hash 853cfa907e4e447edc21fd4de92b0612cb2805241d7bebe53f9022b6e61ee1c8 20afdd7a1a669c55cf036f8cb8a82efa622e32eeda7e08b1b60205801114321f
heuristics/cert_id ANSSI-CC-2019/51 ANSSI-CC-2019/29
heuristics/cpe_matches None cpe:2.3:h:samsung:s3nsen4:-:*:*:*:*:*:*:*
heuristics/report_references/directly_referenced_by ANSSI-CC-2021/06 ANSSI-CC-2021/30
heuristics/report_references/directly_referencing ANSSI-CC-2019/60 ANSSI-CC-2018/30
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2021/06 ANSSI-CC-2021/30-R01, ANSSI-CC-2021/30
heuristics/report_references/indirectly_referencing ANSSI-CC-2017/53, ANSSI-CC-2018/12, ANSSI-CC-2017/12, ANSSI-CC-2018/13, ANSSI-CC-2019/01, ANSSI-CC-2019/59, ANSSI-CC-2019/02, ANSSI-CC-2017/11, ANSSI-CC-2019/60 ANSSI-CC-2018/30
heuristics/scheme_data/cert_id 2019/51 2019/29
heuristics/scheme_data/description Le produit évalué est la famille de microcontrôleurs «S3K200B/S3K170B/S3K140B 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software, version S3K200B_20190930 » développée par SAMSUNG ELECTRONICS CO. LTD.. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs application Le produit évalué est « S3NSEN4/S3NSEN3 32-bit RISC Microcontroller for Smart Card including specific IC Dedicated software, Revision 1 » développé par SAMSUNG ELECTRONICS CO LTD.. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usag
heuristics/scheme_data/enhanced
  • cert_id: 2019/51
  • certification_date: 09/01/2020
  • expiration_date: 09/01/2025
  • category: Micro-circuits
  • cc_version: Critères Communs version 3.1r5
  • developer: Samsung Electronics Co.Ltd.
  • sponsor: Samsung Electronics Co.Ltd.
  • evaluation_facility: CEA-Leti
  • level: EAL5+
  • protection_profile: BSI-CC-PP-0084-2014
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • target_link: https://cyber.gouv.fr/sites/default/files/2020/01/anssi-cible-cc-2019_51en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2020/01/anssi-cc-2019_51.pdf
  • cert_id: 2019/29
  • certification_date: 31/07/2019
  • expiration_date: 09/12/2025
  • category: Micro-circuits
  • cc_version: Critères Communs version 3.1r5
  • developer: Samsung Electronics Co.Ltd.
  • sponsor: Samsung Electronics Co.Ltd.
  • evaluation_facility: CEA-LETI
  • level: EAL6+
  • protection_profile: Security IC Platform Protection Profile, version 1.0, BSI-CC-PP-0084-2014
  • mutual_recognition: SOG-IS CCRA
  • augmented: ASE_TSS.2
  • target_link: https://cyber.gouv.fr/sites/default/files/2019/08/anssi-cible-2019_29en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2019/08/anssi-cc-2019-29fr.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/2019/08/certificat-anssi-cc-2019_29-s01.pdf
heuristics/scheme_data/enhanced/augmented ALC_DVS.2, AVA_VAN.5 ASE_TSS.2
heuristics/scheme_data/enhanced/cert_id 2019/51 2019/29
heuristics/scheme_data/enhanced/certification_date 09/01/2020 31/07/2019
heuristics/scheme_data/enhanced/evaluation_facility CEA-Leti CEA-LETI
heuristics/scheme_data/enhanced/expiration_date 09/01/2025 09/12/2025
heuristics/scheme_data/enhanced/level EAL5+ EAL6+
heuristics/scheme_data/enhanced/protection_profile BSI-CC-PP-0084-2014 Security IC Platform Protection Profile, version 1.0, BSI-CC-PP-0084-2014
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2020/01/anssi-cc-2019_51.pdf https://cyber.gouv.fr/sites/default/files/2019/08/anssi-cc-2019-29fr.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2020/01/anssi-cible-cc-2019_51en.pdf https://cyber.gouv.fr/sites/default/files/2019/08/anssi-cible-2019_29en.pdf
heuristics/scheme_data/expiration_date 9 Janvier 2025 9 Décembre 2025
heuristics/scheme_data/level EAL5+ EAL6+
heuristics/scheme_data/product S3K200B/S3K170B/S3K140B 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software S3NSEN4/S3NSEN3 32-bit RISC Microcontroller for Smart Card including specific IC Dedicated software
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/s3k200bs3k170bs3k140b-32-bit-risc-microcontroller-smart-card-optional-at1-secure https://cyber.gouv.fr/produits-certifies/s3nsen4s3nsen3-32-bit-risc-microcontroller-smart-card-including-specific-ic
pdf_data/cert_filename None certificat ANSSI-CC-2019_29-S01.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2019/29-S01: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0084-2014: 1
  • cc_security_level:
    • EAL:
      • EAL6: 1
  • cc_sar:
    • ASE:
      • ASE_TSS.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • CEA-LETI:
      • CEA-LETI: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 1910766
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Producer: GPL Ghostscript 9.50
  • /CreationDate: D:20210325162618+01'00'
  • /ModDate: D:20210325162618+01'00'
  • /Title: Microsoft Word - certificat ANSSI-CC-2019_29-S01.docx
  • /Creator: PScript5.dll Version 5.2.2
  • /Author: jchuzel
  • pdf_hyperlinks:
pdf_data/report_filename anssi-cc-2019_51.pdf anssi-cc-2019-29fr.pdf
pdf_data/report_frontpage/FR/cc_security_level EAL 5 augmenté ALC_DVS.2, AVA_VAN.5 EAL 6 augmenté ASE_TSS.2
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2019/51 ANSSI-CC-2019/29
pdf_data/report_frontpage/FR/cert_item S3K200B/S3K170B/S3K140B 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software S3NSEN4/S3NSEN3 32-bit RISC Microcontroller for Smart Card including specific IC Dedicated software
pdf_data/report_frontpage/FR/cert_item_version S3K200B_20190930 Revision 1
pdf_data/report_frontpage/FR/developer Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud Samsung Electronics Co Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud Commanditaire Samsung Electronics Co Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330, Corée du Sud
pdf_data/report_frontpage/FR/ref_protection_profiles Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC”, “Loader dedicated for usage in Secured Environment only”, “Loader dedicated for usage by authorized users only Security IC Platform Protection Profile with Augmentation Packages, version 1.0, certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité à “Package 1 : Loader dedicated for usage in Secured Environment only” “Package 2: Loader dedicated for usage by authorized users only
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2019/51: 19
  • ANSSI-CC-2019/60: 2
  • ANSSI-CC-2019/29: 19
  • ANSSI-CC-2018/30: 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 2
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 3 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 2 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 6: 2
  • EAL2: 2
  • EAL7: 1
pdf_data/report_keywords/crypto_library
  • AT1:
    • AT1 Secure RSA/ECC/SHA library: 1
pdf_data/report_keywords/eval_facility/CEA-LETI
  • CEA - LETI: 1
  • CEA - LETI: 1
  • CEA-LETI: 1
pdf_data/report_keywords/randomness/TRNG/DTRNG 13 7
pdf_data/report_keywords/standard_id/BSI
  • AIS31: 1
  • AIS 31: 1
  • AIS 31: 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 1 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
  • miscellaneous:
    • SM4:
      • SM4: 1
pdf_data/report_keywords/vendor/Samsung/Samsung 4 2
pdf_data/report_metadata//Author BENARDEAU Christian DUCLOS Charlene
pdf_data/report_metadata//CreationDate D:20200114121049+01'00' D:20190805100447+02'00'
pdf_data/report_metadata//Keywords ANSSI-CC-CER-F-07.29.1 ANSSI-CC-CER-F-07.29
pdf_data/report_metadata//ModDate D:20200114121049+01'00' D:20190805100447+02'00'
pdf_data/report_metadata//Subject S3K200B/S3K170B/S3K140B 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software S3NSEN4/S3NSEN3 32-bit RISC Microcontroller for Smart Card including specific IC Dedicated software
pdf_data/report_metadata//Title ANSSI-CC-2019/51 ANSSI-CC-2019/29
pdf_data/report_metadata/pdf_file_size_bytes 761066 807088
pdf_data/st_filename anssi-cible-cc-2019_51en.pdf anssi-cible-2019_29en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-CRT: 1
  • ECC:
    • ECDH:
      • ECDH: 15
    • ECDSA:
      • ECDSA: 21
    • ECC:
      • ECC: 24
  • FF:
    • DH:
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 6
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 15
  • ECDSA:
    • ECDSA: 21
  • ECC:
    • ECC: 24
  • ECC:
    • ECC: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 24 2
pdf_data/st_keywords/cc_claims/O
  • O.RSA: 6
  • O.ECC: 2
  • O.RND: 6
  • O.ECDSA: 6
  • O.TDES: 7
  • O.SHA: 6
  • O.ECDH: 4
  • O.MEM_ACCESS: 1
  • O.RND: 6
  • O.TDES: 7
  • O.AES: 5
  • O.MEM_ACCESS: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 2
  • ADV_IMP: 1
  • ADV_ARC.1: 6
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP.4: 2
  • ADV_TDS.3: 1
  • ADV_ARC: 1
  • ADV_FSP: 2
  • ADV_IMP: 1
  • ADV_ARC.1: 5
  • ADV_SPM.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.2: 1
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_FSP.4: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 6 5
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 2 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_DVS.1: 1
  • ALC_CMS.4: 1
  • ALC_DVS.2: 2
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 2
  • ALC_CMC: 1
  • ALC_CMC.5: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_CMS.4: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 7 2
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 2
  • ASE_TSS.2: 11
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 2
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_REQ.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.1: 1
  • ATE_COV: 1
  • ATE_COV.3: 1
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 13 5
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 6
  • EAL 4: 1
  • EAL 5: 2
  • EAL5 augmented: 1
  • EAL 4 augmented: 1
  • EAL 5 augmented: 2
  • EAL6: 7
  • EAL 4: 1
  • EAL6 augmented: 3
  • EAL 4 augmented: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 22
  • FCS_RNG.1: 17
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP.1: 18
  • FCS_COP: 44
  • FCS_CKM.1: 24
  • FCS_CKM.4: 16
  • FCS_CKM: 13
  • FCS_CKM.2: 4
  • FCS_RNG: 17
  • FCS_RNG.1: 14
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP.1: 9
  • FCS_COP: 15
  • FCS_CKM.1: 7
  • FCS_CKM.4: 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 24 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 16 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 44 15
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 18 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 22 17
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 17 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 12 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 12 4
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 22
  • FMT_LIM.1: 28
  • FMT_LIM.2: 32
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 16
  • FMT_MSA.1: 12
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 6
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 9
  • FMT_SMF.1.1: 1
  • FMT_CKM.4: 1
  • FMT_MSA: 2
  • FMT_SMF: 1
  • FMT_LIM: 22
  • FMT_LIM.1: 28
  • FMT_LIM.2: 32
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 16
  • FMT_MSA.1: 12
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 6
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 9
  • FMT_SMF.1.1: 1
  • FMT_MSA: 2
  • FMT_SMF: 1
pdf_data/st_keywords/cipher_mode/ECB/ECB 2 3
pdf_data/st_keywords/crypto_library
  • AT1:
    • AT1 Secure RSA/ECC/SHA Library v2.04: 1
    • AT1 Secure RSA/ECC/SHA library: 5
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
      • SHA-1: 1
    • SHA2:
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA512: 5
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/randomness/RNG/RNG 14 8
pdf_data/st_keywords/randomness/TRNG/DTRNG 43 24
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 3
  • Malfunction: 26
  • malfunction: 13
  • DFA: 4
  • physical tampering: 3
  • Malfunction: 26
  • malfunction: 11
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 13 11
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 23
  • Physical Probing: 4
  • physical probing: 9
  • Physical probing: 2
  • side-channel: 4
  • side channel: 2
  • DPA: 7
  • SPA: 6
  • timing attacks: 1
  • timing attack: 2
  • Leak-Inherent: 23
  • Physical Probing: 4
  • physical probing: 9
  • Physical probing: 2
  • side-channel: 3
  • side channel: 1
  • DPA: 4
  • SPA: 2
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 7 4
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 6 2
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/side-channel 4 3
pdf_data/st_keywords/standard_id/BSI/AIS31 5 1
pdf_data/st_keywords/standard_id/BSI/BSI-AIS31 5 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 3 6
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 3 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 3 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-004 3 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-3: 6
  • FIPS 180-4: 1
  • FIPS197: 1
  • FIPS 197: 1
  • FIPS PUB 180-3: 3
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 6 3
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18032: 2
  • ISO/IEC 18092: 2
  • ISO/IEC 14443: 8
  • ISO/IEC 15693: 4
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • Triple-DES: 6
      • TDES: 14
      • TDEA: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • DES:
      • DES: 9
    • 3DES:
      • Triple-DES: 6
      • TDES: 13
      • TDEA: 1
  • miscellaneous:
    • SM4:
      • SM4: 2
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 14 13
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 11 9
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC 2 1
pdf_data/st_keywords/vendor/Samsung/Samsung 18 19
pdf_data/st_metadata
  • pdf_file_size_bytes: 1262096
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 112
  • /Title: ST_Klallam7_Ver1.1
  • /Author: Windows 사용자
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20191113182337+09'00'
  • /ModDate: D:20191113182337+09'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks: http://www.ecc-brainpool.org/, mailto:[email protected]
None
dgst 8fae32c5e89a2b70 92f34b9bf024bf35