Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
nShield5s Hardware Security Module Version 13.5.1
CSA_CC_23004
Rambus AES-ECB-DPA-FIA cores HW3.0
NSCIB-CC-0397779-CR
name nShield5s Hardware Security Module Version 13.5.1 Rambus AES-ECB-DPA-FIA cores HW3.0
category Products for Digital Signatures ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme SG NL
not_valid_after 24.09.2029 29.07.2027
not_valid_before 24.09.2024 29.07.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20CC%20Certificate.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-certificate%2022-0397779.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20Certificate%20Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0397779-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20[ST]%20nShield5s%20HSM%20Security%20Target%20(SCCS%20certification)-v12.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-lite][revC]AES-ECB-32-DPA-FIA_V3.0_ST-Lite-RevC).pdf
manufacturer Entrust, Inc. Rambus Inc.
manufacturer_web https://www.entrust.com https://www.rambus.com/
security_level EAL4+, AVA_VAN.4, ALC_FLR.2 EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5
dgst aa3ed16ed6a5ff2f de8f81504d9aea23
heuristics/cert_id CSA_CC_23004 NSCIB-CC-0397779-CR
heuristics/cert_lab []
heuristics/extracted_sars ALC_FLR.2, AVA_VAN.4 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 13.5.1 3.0
heuristics/scheme_data
heuristics/protection_profiles ee319f4a624019b0 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf {}
pdf_data/cert_filename [CER] nShield5s Hardware Security Module CC Certificate.pdf NSCIB-certificate 22-0397779.pdf
pdf_data/cert_keywords/cc_cert_id
  • SG:
    • CSA_CC_23004: 1
  • NL:
    • CC-22-0397779: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 4 augmented: 1
  • EAL:
    • EAL2: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.3: 1
  • ATE:
    • ATE_DPT.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20241024132025+08'00'
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-02-18T04:59:28Z
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2021-08-12T02:02:37.1377634Z
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20241024132027+08'00'
  • pdf_file_size_bytes: 389969
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220815111020+01'00'
  • /Creator: C458-M
  • /ModDate: D:20220815152629+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S22081511100
  • pdf_file_size_bytes: 205167
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename [CER] nShield5s Hardware Security Module Certificate Report.pdf NSCIB-CC-0397779-CR.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-0397779-CR
    • cert_item: AES-ECB-DPA-FIA cores HW3.0
    • cert_lab: SGS Brightsight B.V.
    • developer: Rambus Inc
pdf_data/report_keywords/cc_cert_id
  • SG:
    • CSA_CC_23004: 2
  • NL:
    • NSCIB-CC-0397779-CR: 11
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2016/05-: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL4+: 1
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 6
    • EAL4 augmented: 3
    • EAL4+: 7
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
  • ATE:
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 4
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 2
  • ATE:
    • ATE_DPT.2: 2
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_PHP.1: 1
    • FPT_PHP.3: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-: 1
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 4
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
    • side-channels: 1
  • FI:
    • DFA: 1
    • Fault Injection: 1
    • fault injection: 2
  • SCA:
    • DPA: 2
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
    • CCMB-2018-04-003: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
  • NIST:
    • SP 800-90A: 1
pdf_data/report_metadata
  • /CreationDate: D:20241025095332+08'00'
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-08-02T09:37:22Z
  • /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2020-11-20T03:35:11.8228409Z
  • /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
  • /ModDate: D:20241025095339+08'00'
  • pdf_file_size_bytes: 441046
  • pdf_hyperlinks: https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/singapore-common-criteria-scheme/product-list, https://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename [DD] [ST] nShield5s HSM Security Target (SCCS certification)-v12.pdf [ST-lite][revC]AES-ECB-32-DPA-FIA_V3.0_ST-Lite-RevC).pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.2: 7
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG.2: 3
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
    • FCS_RNG: 7
    • FCS_RNG.1: 5
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 10
    • FDP_ACF: 9
    • FDP_ACF.1: 12
    • FDP_IFC: 6
    • FDP_IFC.1: 7
    • FDP_IFF: 4
    • FDP_IFF.1: 7
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 4
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU: 6
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 2
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 16
    • FMT_MSA.1: 5
    • FMT_MSA.3: 9
    • FMT_MTD: 7
    • FMT_MTD.1: 2
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 3
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FTP:
    • FTP_TRP: 7
    • FTP_TRP.1: 3
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 8
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 2
    • FDP_ITC.1: 14
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 2
  • FMT:
    • FMT_MSA.3: 2
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
  • FRU:
    • FRU_FLT.2: 7
    • FRU_FLT.2.1: 1
pdf_data/st_keywords/cc_claims
  • OT:
    • OT.RNG: 5
  • O:
    • O.AES: 6
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
    • CAST:
      • CAST: 1
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • TDEA: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 2
  • miscellaneous:
    • Camellia:
      • Camellia: 1
    • SEED:
      • SEED: 1
  • AES_competition:
    • AES:
      • AES: 27
      • AES-128: 1
      • AES-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 3
    • ECIES:
      • ECIES: 1
  • FF:
    • DH:
      • DH: 3
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • RIPEMD:
    • RIPEMD-160: 2
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
    • SHA3:
      • SHA3-224: 2
      • SHA3-256: 2
      • SHA3-384: 2
      • SHA3-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RNG: 20
  • PRNG:
    • PRNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 8
  • CFB:
    • CFB: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 4
pdf_data/st_keywords/ecc_curve
  • Edwards:
    • Ed25519: 1
  • NIST:
    • B-163: 3
    • B-283: 6
    • B-409: 6
    • B-571: 6
    • K-163: 3
    • K-283: 6
    • K-409: 6
    • K-571: 6
    • NIST B-233: 6
    • NIST K-233: 6
    • NIST P-224: 6
    • P-192: 6
    • P-224: 6
    • P-256: 12
    • P-384: 12
    • P-521: 12
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • physical tampering: 2
  • FI:
    • Fault Injection: 1
    • fault injection: 1
    • malfunction: 1
  • SCA:
    • DPA: 3
    • side-channel: 1
    • template attacks: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-3: 2
    • FIPS 180-4: 1
    • FIPS 186-4: 2
    • FIPS 197: 5
    • FIPS 198-1: 1
    • FIPS 202: 2
  • ISO:
    • ISO/IEC 19790:2012: 1
  • NIST:
    • NIST SP 800-22: 1
    • SP 800-108: 1
    • SP 800-38A: 1
    • SP 800-38B: 1
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-38F: 1
    • SP 800-56A: 2
    • SP 800-67: 1
    • SP 800-90A: 1
    • SP 800-90B: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
  • RFC:
    • RFC 8017: 1
    • RFC2612: 1
    • RFC6979: 1
  • CC:
    • CCMB-2017-04-0004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 2
  • NIST:
    • NIST SP 800-38A: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • X25519: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 205 in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
    • This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
    • This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
    • contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] This refinement refers to mechanisms against physical attacks that require: 1
    • in the development environment as defined above. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
    • is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
    • must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
    • of the layout or tests besides the TSFI. This refinement is regarded out of scope for the TOE, as physical attacks are not in scope and there is no layout to be verified. 218 in [PP: 1
    • out of scope: 14
    • out of scope for the TOE. AVA_VAN 245 in [PP] This refinement is applicable without any adjustments, but it has: 1
    • to identify the TOE in line with FAU_SAS.1, which is not claimed in this ST. This refinement is out of scope for the TOE. 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This: 1
    • to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
    • transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
pdf_data/st_metadata
  • /Author: Entrust
  • /CreationDate: D:20240424161653+02'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240424161653+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 6749388
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
  • /CreationDate: D:20220704125503-07'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220704125503-07'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 466125
  • pdf_hyperlinks: mailto:[email protected], https://www.rambus.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different