Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145
ANSSI-CC-2020/26
Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
ANSSI-CC-2020/07
name Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
not_valid_before 2020-06-16 2020-03-31
not_valid_after 2025-06-16 2027-03-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_26en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_07en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_26fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-fr.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': frozenset({'ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 10, 20), 'maintenance_title': 'ANSSI-CC-2020/26-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_26-m01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-26en.pdf'}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2020, 7, 23), 'maintenance_title': 'ANSSI-CC-2020/07-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-m01.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 3, 28), 'maintenance_title': 'Reassessment report : ANSSI-CC-2020/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-s01fr1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2020_07-s01.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 5, 16), 'maintenance_title': 'Maintenance report : ANSSI-CC-2020/07-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-m02.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 3, 28), 'maintenance_title': 'Reassessment report: ANSSI-CC-2020/07-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_07-s01fr.pdf', 'maintenance_st_link': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None fe335c8ba5b824602982cd473fdf60cc90f6d5ad4f86878d9bab9b705677db07
state/cert/txt_hash None 1db1bd2d3c13b3f08ad2bc162a6c15f0fd66a74aa777129acde4c4de206cdaba
state/report/pdf_hash 810183e5acf14d8e66dc28037841d05aa90256b8e466ffee4281bfe7b0dbdbed 3996e239c72d181094b76bd38b58cf629382f9603eea456b4382b56461d6e63f
state/report/txt_hash bf5c67f94ddee3c4c3ffde18edceca94dda413968ea9ac542c911664e43ff26d 15a1e2ed5352aa2d710ffe8a000b76f1733640fb99253f023c444a900d80693e
state/st/pdf_hash 7ae5caaa15da5cc1f7c647b78d0703011f7ab9f038b67a0ef3a06e61532f2758 f2253108b3d5baad833abb27ec6ea00f236000f43a23281fe43ae078f32d8a43
state/st/txt_hash 155973df0a2daf52533b3d05047abdd947661882ae689d1377938b8942f040f3 d0b34b74aa182a8c12e6ba252de1dce3ea72887b1b753cc410246239f5d3d0d7
heuristics/cert_id ANSSI-CC-2020/26 ANSSI-CC-2020/07
heuristics/extracted_versions 8.2 9.1
heuristics/report_references/directly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 ANSSI-CC-2020/59, ANSSI-CC-2022/33, ANSSI-CC-2020/55, ANSSI-CC-2020/56, NSCIB-CC-0286907-CR, ANSSI-CC-2020/57, NSCIB-CC-22-0286910-CR, ANSSI-CC-2020/58
heuristics/report_references/directly_referencing ANSSI-CC-2019/28, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018 BSI-DSZ-CC-1110-V2-2019
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 ANSSI-CC-2020/59, ANSSI-CC-2022/33, ANSSI-CC-2020/55, ANSSI-CC-2020/56, NSCIB-CC-0286907-CR, ANSSI-CC-2020/57, NSCIB-CC-22-0286910-CR, ANSSI-CC-2020/58
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2019/28 BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016
heuristics/scheme_data/cert_id 2020/26 2020/07
heuristics/scheme_data/description Le produit évalué est « Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145, identification du matériel : 091121, identification du patch : 094222 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur NXP P60D145 développé et fabriqué par NXP SEMICONDUCTORS GMBH. Le produit dispose d'interfaces avec et sans contact. Il est destiné à héberger et exécuter une ou plus Le produit évalué est la « Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32, Identification du matériel 092914 ». Elle est développée par IDEMIA et embarquée sur le microcontrôleur développé et fabriqué par INFINEON TECHNOLOGIES AG. Ce produit est une plateforme ouverte Java Card conforme à la spécification émise par Global Platform, contact et/ou sans contact, destinée à accueil
heuristics/scheme_data/developer Idemia, NXP Semiconductors GmnH IDEMIA, INFINEON TECHNOLOGIES AG
heuristics/scheme_data/enhanced
  • cert_id: 2020/26
  • certification_date: 16/06/2020
  • expiration_date: 16/06/2025
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: Idemia, NXP Semiconductors GmnH
  • sponsor: Idemia
  • evaluation_facility: CEA-Leti
  • level: EAL5+
  • protection_profile: Java Card Protection Profile Open Configuration, version 3.0
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_26fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-cc-2020_26en.pdf
  • cert_id: 2020/07
  • certification_date: 31/03/2020
  • expiration_date: 28/03/2027
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: IDEMIA, INFINEON TECHNOLOGIES AG
  • sponsor: IDEMIA, INFINEON TECHNOLOGIES AG
  • evaluation_facility: CEA - LETI
  • level: EAL5+
  • protection_profile: Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • target_link: https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/2020/04/certificat-cc-2020_07-s01.pdf
heuristics/scheme_data/enhanced/cert_id 2020/26 2020/07
heuristics/scheme_data/enhanced/certification_date 16/06/2020 31/03/2020
heuristics/scheme_data/enhanced/developer Idemia, NXP Semiconductors GmnH IDEMIA, INFINEON TECHNOLOGIES AG
heuristics/scheme_data/enhanced/evaluation_facility CEA-Leti CEA - LETI
heuristics/scheme_data/enhanced/expiration_date 16/06/2025 28/03/2027
heuristics/scheme_data/enhanced/protection_profile Java Card Protection Profile Open Configuration, version 3.0 Java Card Protection Profile Open Configuration, version 3.0.5 (BSI-CC-PP-0099-2017)
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cc-2020_26fr.pdf https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_07-fr.pdf
heuristics/scheme_data/enhanced/sponsor Idemia IDEMIA, INFINEON TECHNOLOGIES AG
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2020/06/anssi-cible-cc-2020_26en.pdf https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_07-m02en.pdf
heuristics/scheme_data/expiration_date 16 Juin 2025 28 Mars 2027
heuristics/scheme_data/product Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
heuristics/scheme_data/sponsor Idemia IDEMIA, INFINEON TECHNOLOGIES AG
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v82-masquee-sur-le-composant-nxp-p60d145-0 https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v91-masquee-sur-le-composant-ifx-slc32
heuristics/st_references/directly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 ANSSI-CC-2020/59, ANSSI-CC-2022/33, ANSSI-CC-2020/55, ANSSI-CC-2020/56, ANSSI-CC-2020/57, ANSSI-CC-2020/58
heuristics/st_references/directly_referencing None BSI-DSZ-CC-1110-V2-2019
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2020/52, ANSSI-CC-2020/50, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2020/35, ANSSI-CC-2020/51, ANSSI-CC-2020/37, ANSSI-CC-2020/53 ANSSI-CC-2020/59, ANSSI-CC-2022/33, ANSSI-CC-2020/55, ANSSI-CC-2020/56, ANSSI-CC-2020/57, ANSSI-CC-2020/58
heuristics/st_references/indirectly_referencing None BSI-DSZ-CC-1110-V2-2019
pdf_data/cert_filename None certificat-cc-2020_07-s01.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2020/07-S01: 2
  • cc_protection_profile_id:
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Idemia:
      • IDEMIA: 2
  • eval_facility:
    • CEA-LETI:
      • CEA-LETI: 2
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 100060
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author: Géraldine Avoué
  • /Category: -S01
  • /Comments: ANSSI-CC-CER-F-14_v14.6
  • /Company: SGDSN
  • /CreationDate: D:20220404173043+02'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /ModDate: D:20220404173044+02'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20220404153033
  • /Title: ANSSI-CC-2020/07
  • pdf_hyperlinks:
pdf_data/report_filename anssi-cc-2020_26fr.pdf anssi-cc-2020_07-fr.pdf
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2020/26 ANSSI-CC-2020/07
pdf_data/report_frontpage/FR/cert_item Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
pdf_data/report_frontpage/FR/cert_item_version Identification du matériel : 091121 Identification du patch : 094222 Identification du matériel : 092914
pdf_data/report_frontpage/FR/developer Idemia 2 place Samuel de Champlain 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain 92400 Courbevoie, France IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain 92400 Courbevoie, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0 Java Card Protection Profile Open Configuration, version 3.0.5 certifié BSI-CC-PP-0099-2017 le 21 décembre 2017
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1059-V3-2019: 2
  • BSI-DSZ-CC-1059-2018: 1
  • BSI-DSZ-CC-1110-V2-2019: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2020/26: 19
  • ANSSI-CC-2019/28: 3
  • ANSSI-CC-2019/28-M01: 1
  • ANSSI-CC-2020/07: 19
pdf_data/report_keywords/cc_protection_profile_id/ANSSI
  • ANSSI-CC-PP-2010/03M01: 1
  • ANSSI-CC-PP-0099-2017: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0099-2017: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_ALP 4 3
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 3 5
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 2
  • ALC_FLR.1: 1
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 2
  • ALC_FLR: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • Serma:
    • SERMA: 11
  • CESTI:
    • CESTI: 1
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 1
pdf_data/report_keywords/eval_facility/CEA-LETI
  • CEA - LETI: 1
  • CEA - LETI: 1
  • CEA-LETI: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 35
    • NXP Semiconductors: 3
  • Idemia:
    • Idemia: 2
    • IDEMIA: 14
  • Infineon:
    • Infineon Technologies AG: 1
    • Infineon: 2
  • Idemia:
    • IDEMIA: 37
pdf_data/report_keywords/vendor/Idemia
  • Idemia: 2
  • IDEMIA: 14
  • IDEMIA: 37
pdf_data/report_keywords/vendor/Idemia/IDEMIA 14 37
pdf_data/report_metadata
  • pdf_file_size_bytes: 714501
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20200617145110+02'00'
  • /ModDate: D:20200617145110+02'00'
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_file_size_bytes: 281614
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Title: ANSSI-CC-2020/07
  • /Author: Géraldine Avoué
  • /Subject: Plateforme ID-One Cosmo V9.1 masquée sur le composant IFX SLC32
  • /Keywords: ANSSI-CC-CER-F-07, v29.2
  • /Creator: Writer
  • /Producer: LibreOffice 4.4
  • /CreationDate: D:20200402164050+02'00'
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata//CreationDate D:20200617145110+02'00' D:20200402164050+02'00'
pdf_data/report_metadata/pdf_file_size_bytes 714501 281614
pdf_data/st_filename anssi-cible-cc-2020_26en.pdf anssi-cible-cc-2020_07en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 8 4
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 2 3
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 4
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1059: 2
  • BSI-DSZ-CC-1110-V2-2019: 2
pdf_data/st_keywords/cc_claims/D
  • D.BIO: 12
  • D.CONFIG: 4
  • D.SENSITIVE_DATA: 2
  • D.ARRAY: 5
  • D.JCS_KEYS: 6
  • D.APP_CODE: 6
  • D.APP_C_DATA: 3
  • D.APP_I_DATA: 4
  • D.PIN: 9
  • D.API_DATA: 3
  • D.CRYPTO: 4
  • D.JCS_CODE: 3
  • D.JCS_DATA: 5
  • D.SEC_DATA: 7
  • D.A: 1
  • D.NB_REMAINTRYGLB: 1
  • D.APP_CODE: 6
  • D.APP_C_DATA: 3
  • D.APP_I_DATA: 4
  • D.PIN: 7
  • D.API_DATA: 3
  • D.CRYPTO: 5
  • D.JCS_CODE: 3
  • D.JCS_DATA: 5
  • D.SEC_DATA: 7
  • D.CONFIG: 4
  • D.SENSITIVE_DATA: 5
  • D.ARRAY: 3
  • D.JCS_KEYS: 7
  • D.NB_REMAINTRYGLB: 1
pdf_data/st_keywords/cc_claims/D/D.ARRAY 5 3
pdf_data/st_keywords/cc_claims/D/D.CRYPTO 4 5
pdf_data/st_keywords/cc_claims/D/D.JCS_KEYS 6 7
pdf_data/st_keywords/cc_claims/D/D.PIN 9 7
pdf_data/st_keywords/cc_claims/D/D.SENSITIVE_DATA 2 5
pdf_data/st_keywords/cc_claims/O
  • O.CARD_MANAGEMENT: 51
  • O.SCP: 54
  • O.RESIDENT_APPLICATION: 23
  • O.SECURE_COMPARE: 10
  • O.PATCH_LOADING: 26
  • O.BIO-: 8
  • O.SID: 33
  • O.FIREWALL: 64
  • O.GLOBAL_ARRAYS_CONFID: 19
  • O.GLOBAL_ARRAYS_INTEG: 10
  • O.NATIVE: 14
  • O.OPERATE: 36
  • O.REALLOCATION: 17
  • O.RESOURCES: 24
  • O.ALARM: 21
  • O.CIPHER: 19
  • O.KEY-MNGT: 26
  • O.PIN-MNGT: 28
  • O.BIO-MNGT: 17
  • O.TRANSACTION: 19
  • O.OBJ-DELETION: 8
  • O.DELETION: 15
  • O.LOAD: 16
  • O.INSTALL: 18
  • O.PIN-: 2
  • O.APPLET: 15
  • O.CODE_PKG: 20
  • O.JAVAOBJECT: 47
  • O.REMOTE_MTHD: 1
  • O.REMOTE_OBJ: 1
  • O.ROR: 1
  • O.APPI: 1
  • O.COIPKG: 1
  • O.JAVAOBJE: 1
  • O.SCP: 60
  • O.CARD_MANAGEMENT: 66
  • O.SID: 34
  • O.FIREWALL: 64
  • O.GLOBAL_ARRAYS_CONFID: 14
  • O.GLOBAL_ARRAYS_INTEG: 10
  • O.NATIVE: 14
  • O.OPERATE: 39
  • O.REALLOCATION: 18
  • O.RESOURCES: 23
  • O.ALARM: 23
  • O.CIPHER: 16
  • O.RNG: 11
  • O.KEY-MNGT: 26
  • O.PIN-MNGT: 26
  • O.TRANSACTION: 19
  • O.OBJ-DELETION: 8
  • O.DELETION: 14
  • O.LOAD: 20
  • O.INSTALL: 17
  • O.RESIDENT_APPLICATION: 24
  • O.SECURE_COMPARE: 8
  • O.PATCH_LOADING: 25
  • O.PIN-: 2
  • O.APPLET: 16
  • O.CODE_PKG: 22
  • O.JAVAOBJECT: 55
  • O.OBJ-: 1
pdf_data/st_keywords/cc_claims/O/O.ALARM 21 23
pdf_data/st_keywords/cc_claims/O/O.APPLET 15 16
pdf_data/st_keywords/cc_claims/O/O.CARD_MANAGEMENT 51 66
pdf_data/st_keywords/cc_claims/O/O.CIPHER 19 16
pdf_data/st_keywords/cc_claims/O/O.CODE_PKG 20 22
pdf_data/st_keywords/cc_claims/O/O.DELETION 15 14
pdf_data/st_keywords/cc_claims/O/O.GLOBAL_ARRAYS_CONFID 19 14
pdf_data/st_keywords/cc_claims/O/O.INSTALL 18 17
pdf_data/st_keywords/cc_claims/O/O.JAVAOBJECT 47 55
pdf_data/st_keywords/cc_claims/O/O.LOAD 16 20
pdf_data/st_keywords/cc_claims/O/O.OPERATE 36 39
pdf_data/st_keywords/cc_claims/O/O.PATCH_LOADING 26 25
pdf_data/st_keywords/cc_claims/O/O.PIN-MNGT 28 26
pdf_data/st_keywords/cc_claims/O/O.REALLOCATION 17 18
pdf_data/st_keywords/cc_claims/O/O.RESIDENT_APPLICATION 23 24
pdf_data/st_keywords/cc_claims/O/O.RESOURCES 24 23
pdf_data/st_keywords/cc_claims/O/O.SCP 54 60
pdf_data/st_keywords/cc_claims/O/O.SECURE_COMPARE 10 8
pdf_data/st_keywords/cc_claims/O/O.SID 33 34
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 38
  • OE.CODE-: 3
  • OE.CARD_MANAGEMENT: 3
  • OE.SCP: 6
  • OE.CODE-EVIDENCE: 18
  • OE.APPLET: 8
  • OE.SCP: 9
  • OE.CARD-: 1
  • OE.VERIFICATION: 38
  • OE.CODE-EVIDENCE: 18
  • OE.CARD_MANAGEMENT: 3
  • OE.APPLET: 8
  • OE.CODE-: 3
pdf_data/st_keywords/cc_claims/OE/OE.SCP 6 9
pdf_data/st_keywords/cc_claims/OP
  • OP.ARRAY_ACCESS: 9
  • OP.CREATE: 6
  • OP.DELETE_APPLET: 4
  • OP.DELETE_PCKG: 3
  • OP.DELETE_PCKG_APPLET: 3
  • OP.FLOW: 3
  • OP.IMPORT_KEY: 1
  • OP.INSTANCE_FIELD: 6
  • OP.INVK_INTERFACE: 7
  • OP.INVK_VIRTUAL: 6
  • OP.JAVA: 5
  • OP.THROW: 5
  • OP.TYPE_ACCESS: 5
  • OP.PUT: 6
  • OP.RET_RORD: 1
  • OP.STATIC_FIELD: 3
  • OP.CRE: 1
  • OP.OPERAND_STACK_ACCESS: 2
  • OP.LOCAL_STACK_ACCESS: 2
  • OP.ARRAY_ACCESS: 9
  • OP.ARRAY_LENGTH: 3
  • OP.ARRAY_AASTORE: 3
  • OP.CREATE: 7
  • OP.DELETE_APPLET: 4
  • OP.DELETE_PCKG: 3
  • OP.DELETE_PCKG_APPLET: 3
  • OP.FLOW: 3
  • OP.IMPORT_KEY: 2
  • OP.INSTANCE_FIELD: 5
  • OP.INVK_INTERFACE: 7
  • OP.INVK_VIRTUAL: 6
  • OP.JAVA: 5
  • OP.THROW: 5
  • OP.TYPE_ACCESS: 5
  • OP.LOCAL_STACK_ACCESS: 3
  • OP.OPERAND_STACK_ACCESS: 3
  • OP.PUT: 6
  • OP.STATIC_FIELD: 3
  • OP.NATIVE_ACCESS: 1
  • OP.NATIVE_INTERFACE_CALL: 1
  • OP.PUTFIELD: 1
  • OP.PUTSTATIC: 1
pdf_data/st_keywords/cc_claims/OP/OP.CREATE 6 7
pdf_data/st_keywords/cc_claims/OP/OP.IMPORT_KEY 1 2
pdf_data/st_keywords/cc_claims/OP/OP.INSTANCE_FIELD 6 5
pdf_data/st_keywords/cc_claims/OP/OP.LOCAL_STACK_ACCESS 2 3
pdf_data/st_keywords/cc_claims/OP/OP.OPERAND_STACK_ACCESS 2 3
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION 5 6
pdf_data/st_keywords/cc_claims/R/R.JAVA 9 10
pdf_data/st_keywords/cc_claims/T
  • T.CONFIGURATION: 5
  • T.CONF_DATA_APPLET: 5
  • T.PATCH_LOADING: 5
  • T.CONFID-APPLI-DATA: 18
  • T.CONFID-JCS-CODE: 4
  • T.CONFID-JCS-DATA: 5
  • T.INTEG-APPLI-CODE: 9
  • T.INTEG-APPLI-DATA: 15
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 5
  • T.SID: 18
  • T.EXE-CODE: 9
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 6
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.INTEG-APPLI-: 13
  • T.CONFID-JCS-: 8
  • T.INTEG-JCS-: 7
  • T.INTEG-: 2
  • T.CONFID-APPLI-DATA: 18
  • T.CONFID-JCS-CODE: 6
  • T.CONFID-JCS-DATA: 11
  • T.INTEG-APPLI-CODE: 11
  • T.INTEG-APPLI-DATA: 21
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 12
  • T.SID: 18
  • T.EXE-CODE: 8
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 6
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.CONFIGURATION: 4
  • T.CONF_DATA_APPLET: 4
  • T.PATCH_LOADING: 4
  • T.INTEG-APPLI-: 5
  • T.INTEG-: 2
  • T.EXE-: 1
pdf_data/st_keywords/cc_claims/T/T.CONFID-JCS-CODE 4 6
pdf_data/st_keywords/cc_claims/T/T.CONFID-JCS-DATA 5 11
pdf_data/st_keywords/cc_claims/T/T.CONFIGURATION 5 4
pdf_data/st_keywords/cc_claims/T/T.CONF_DATA_APPLET 5 4
pdf_data/st_keywords/cc_claims/T/T.EXE-CODE 9 8
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI- 13 5
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-CODE 9 11
pdf_data/st_keywords/cc_claims/T/T.INTEG-APPLI-DATA 15 21
pdf_data/st_keywords/cc_claims/T/T.INTEG-JCS-DATA 5 12
pdf_data/st_keywords/cc_claims/T/T.PATCH_LOADING 5 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03_M01: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 6
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_FSP.5: 8
  • ADV_TDS.4: 8
  • ADV_IMP.1: 9
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_ARC.1: 6
  • ADV_FSP.1: 3
  • ADV_TDS.1: 2
  • ADV_FSP.5: 8
  • ADV_TDS.4: 8
  • ADV_IMP.1: 9
  • ADV_TDS.3: 4
  • ADV_INT.2: 1
  • ADV_FSP.2: 2
  • ADV_FSP.4: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 4 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 1 2
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 10 8
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 12 7
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 11
  • ALC_FLR.1: 1
  • ALC_DVS: 1
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 13
  • ALC_DVS: 1
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 11 13
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL.1: 1
  • ASE_ECD.1: 4
  • ASE_INT.1: 5
  • ASE_REQ.1: 2
  • ASE_REQ.2: 2
  • ASE_OBJ.2: 3
  • ASE_SPD.1: 2
  • ASE_TSS.1: 1
  • ASE_CCL.1: 1
  • ASE_ECD.1: 4
  • ASE_INT.1: 5
  • ASE_REQ.1: 2
  • ASE_REQ.2: 2
  • ASE_OBJ.2: 3
  • ASE_SPD.1: 2
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 11 15
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 4
  • EAL6: 1
  • EAL5: 5
  • EAL5 augmented: 1
  • EAL5: 9
  • EAL5+: 2
  • EAL4: 1
  • EAL5 augmented: 5
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 9
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 5
pdf_data/st_keywords/cc_security_level/EAL/EAL5+ 4 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.2: 10
  • FAU_ARP.1: 20
  • FAU_ARP.1.1: 1
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_SAA.1: 3
  • FAU_GEN.1: 2
  • FAU_ARP.1: 20
  • FAU_ARP.1.1: 1
  • FAU_STG.2: 9
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_SAA.1: 3
  • FAU_GEN.1: 2
  • FAU_GEN: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.2 10 9
pdf_data/st_keywords/cc_sfr/FCO/FCO_NRO 19 16
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 11
  • FCS_COP: 29
  • FCS_CKM: 23
  • FCS_RNG.1: 4
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.1: 23
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 12
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 10
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 22
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 16
  • FCS_COP.1.1: 1
  • FCS_RNG: 3
  • FCS_RNG.1: 10
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_CKM.1: 20
  • FCS_CKM.1.1: 1
  • FCS_CKM.4: 19
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 16
  • FCS_COP.1.1: 1
  • FCS_COP: 27
  • FCS_CKM: 22
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 23 22
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 23 20
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 22 19
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 29 27
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 11 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 4 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 84
  • FDP_ACF: 69
  • FDP_UCT: 13
  • FDP_ITC: 28
  • FDP_UIT: 19
  • FDP_ACC.2: 13
  • FDP_ACF.1: 34
  • FDP_IFC: 31
  • FDP_IFC.1: 21
  • FDP_IFF: 24
  • FDP_IFF.1: 16
  • FDP_RIP: 151
  • FDP_RIP.1: 10
  • FDP_ROL.1: 5
  • FDP_ROL: 17
  • FDP_SDI.2: 12
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.2: 16
  • FDP_IFC.2: 2
  • FDP_UIT.1: 4
  • FDP_UCT.1: 1
  • FDP_ITC.1: 10
  • FDP_ACC.1: 24
  • FDP_ACC: 72
  • FDP_ACC.2: 13
  • FDP_ACF: 59
  • FDP_ACF.1: 34
  • FDP_IFC: 28
  • FDP_IFC.1: 21
  • FDP_IFF: 22
  • FDP_IFF.1: 16
  • FDP_RIP: 131
  • FDP_RIP.1: 11
  • FDP_ROL.1: 6
  • FDP_ROL: 16
  • FDP_SDI: 11
  • FDP_SDI.2: 2
  • FDP_ITC: 26
  • FDP_ITC.2: 14
  • FDP_IFC.2: 2
  • FDP_UIT: 17
  • FDP_UIT.1: 4
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_ITC.1: 8
  • FDP_ACC.1: 24
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 84 72
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 69 59
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC 31 28
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF 24 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 28 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 16 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 151 131
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 10 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 17 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL.1 5 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 12 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 13 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 19 17
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 49 35
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 10 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD 20 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 3 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 66 56
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 11 12
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 37 31
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB 10 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF 12 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 215 191
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 4 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 26 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 51 39
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 5 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 73 62
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 31 30
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 68 61
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 57 56
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO 29 16
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 17 13
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.1: 13
  • FPT_TDC: 9
  • FPT_PHP: 9
  • FPT_FLS: 57
  • FPT_RCV: 39
  • FPT_FLS.1: 21
  • FPT_FLS.1.1: 2
  • FPT_TDC.1: 12
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV.3: 11
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_FLS.1: 18
  • FPT_FLS.1.1: 2
  • FPT_TDC.1: 11
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_FLS: 45
  • FPT_RCV: 26
  • FPT_RCV.3: 7
  • FPT_TST.1: 11
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_TDC: 9
  • FPT_PHP: 7
  • FPT_PHP.3: 1
  • FPT_RCV.4: 1
  • FPT_TST: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 57 45
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 21 18
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 9 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV 39 26
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV.3 11 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 12 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 13 11
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT 9 7
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 28 16
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 10 7
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • ECB:
    • ECB: 5
  • CBC:
    • CBC: 3
pdf_data/st_keywords/cipher_mode/ECB/ECB 3 5
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 2
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 4
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 4
    • SHA1: 1
  • SHA2:
    • SHA-224: 2
    • SHA-384: 1
    • SHA-256: 2
    • SHA-512: 1
  • SHA3:
    • SHA3-224: 2
    • SHA3-384: 2
    • SHA3-512: 2
    • SHA3-256: 1
    • SHA-3: 3
  • SHA1:
    • SHA-1: 4
  • SHA2:
    • SHA-256: 5
    • SHA-384: 4
    • SHA-224: 4
    • SHA-512: 3
    • SHA256: 1
    • SHA-2: 1
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 4
  • SHA1: 1
  • SHA-1: 4
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-384: 1
  • SHA-256: 2
  • SHA-512: 1
  • SHA-256: 5
  • SHA-384: 4
  • SHA-224: 4
  • SHA-512: 3
  • SHA256: 1
  • SHA-2: 1
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 2 4
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 2 5
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 1 4
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 1 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.se: 1
    • javacard.crypto: 1
    • javacard.security: 3
    • javacard.framework: 4
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
    • javacardx.security: 1
    • javacardx.framework.util: 1
  • javacard:
    • javacard.sac.sac: 1
    • javacard.security: 3
    • javacard.framework: 4
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.security: 1
    • javacardx.framework.util: 1
  • com:
    • com.oberthurcs.javacard: 2
    • com.oberthurcs.javacard.sac.sac: 1
pdf_data/st_keywords/javacard_packages/javacard
  • javacard.se: 1
  • javacard.crypto: 1
  • javacard.security: 3
  • javacard.framework: 4
  • javacard.sac.sac: 1
  • javacard.security: 3
  • javacard.framework: 4
pdf_data/st_keywords/javacard_packages/javacardx
  • javacardx.biometry: 1
  • javacardx.crypto: 2
  • javacardx.security: 1
  • javacardx.framework.util: 1
  • javacardx.crypto: 2
  • javacardx.security: 1
  • javacardx.framework.util: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
  • GlobalPlatform:
    • Global Platform 2.2.1: 2
  • JavaCard:
    • Java Card 3.0.5: 7
pdf_data/st_keywords/javacard_version/JavaCard
  • Java Card 3.0.4: 4
  • Java Card 3.0.5: 7
pdf_data/st_keywords/randomness/RNG/RNG 14 24
pdf_data/st_keywords/side_channel_analysis/SCA
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • timing attack: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 46-3: 4
  • FIPS PUB 81: 6
  • FIPS PUB 197: 4
  • FIPS PUB 202: 3
  • FIPS 140-2: 1
  • FIPS PUB 180-3: 1
  • FIPS PUB 186-3: 1
  • FIPS PUB 46-3: 3
  • FIPS PUB 81: 8
  • FIPS PUB 180-3: 2
  • FIPS PUB 197: 6
  • FIPS 198: 1
  • FIPS 140-2: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 1 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 4 6
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 4 3
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 81 6 8
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 2
  • ISO/IEC 14443: 2
  • ISO/IEC 9797: 8
  • ISO/IEC 9796-: 1
  • ISO/IEC 7816-6: 1
  • ISO/IEC 9796-1: 1
  • ISO/IEC 9797-1: 1
  • ISO/IEC 9796-1: 2
  • ISO/IEC 9797-1: 1
  • ISO/IEC 7816: 2
  • ISO/IEC 14443: 2
  • ISO/IEC 9797: 12
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9796-1 1 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9797 8 12
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-90 2 1
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 3 2
pdf_data/st_keywords/standard_id/SCP/SCP03 5 4
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 10
  • TDES: 12
  • Triple-DES: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 10 12
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 16 12
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 2
  • HMAC: 3
  • CMAC: 4
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/HMAC 2 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 10
  • Idemia:
    • IDEMIA: 52
  • Infineon:
    • Infineon: 8
    • Infineon Technologies AG: 1
  • Idemia:
    • IDEMIA: 175
pdf_data/st_keywords/vendor/Idemia/IDEMIA 52 175
pdf_data/st_metadata
  • pdf_file_size_bytes: 3856796
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 202
  • /Title: Security Target ERATO
  • /Author: Sarra MESTIRI
  • /Subject: ST cosmo V8
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20200603093031+02'00'
  • /ModDate: D:20200603093031+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2862110
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 150
  • /Title: Title
  • /Author: [email protected]
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20200228163658+01'00'
  • /ModDate: D:20200228163658+01'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Sarra MESTIRI [email protected]
pdf_data/st_metadata//CreationDate D:20200603093031+02'00' D:20200228163658+01'00'
pdf_data/st_metadata//ModDate D:20200603093031+02'00' D:20200228163658+01'00'
pdf_data/st_metadata//Title Security Target ERATO Title
pdf_data/st_metadata/pdf_file_size_bytes 3856796 2862110
pdf_data/st_metadata/pdf_number_of_pages 202 150
dgst f343a98bc35eaae5 61985466e51db7a4