name |
Microcontrôleurs sécurisés SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 et SB23ZD04 incluant optionnellement la librairie cryptographique NesLib révision 3.1
|
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2014-10-21
|
2014-07-21
|
not_valid_after |
2019-10-21
|
2024-10-18
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2014_27_LITE.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST33G1M2_SECURITY_TARGET_PUBLIC_SMD_ST33G_ST_13_002_v2_3.pdf
|
status |
archived
|
active
|
manufacturer |
STMicroelectronics
|
STMicroelectronics S.A.
|
manufacturer_web |
https://www.st.com/
|
https://www.st.com/
|
security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_60en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014-46.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2014_46-S05.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2017, 7, 21), 'maintenance_title': 'ANSSI-CC-2014/60-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014-60_m01.pdf', 'maintenance_st_link': None}) |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2019, 10, 18), 'maintenance_title': 'Reassessment report : ANSSI-CC-2014/46-S05', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014_46-s05fr.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 1, 18), 'maintenance_title': 'ANSSI-CC-2014/46-M02', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014_46-m02fr.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 3, 17), 'maintenance_title': 'ANSSI-CC-2014/46-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2014_46-m01.pdf', 'maintenance_st_link': None}) |
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
f4ae47249963bea7801e7dc3fd7850af218354cd8b74407dbbe4dace00fc9703
|
state/cert/txt_hash |
None
|
3630bafaf898c4364a9d6c8615db5c3212648c8c04793a14079bd5738ee6e110
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
cd88d06c88246e30f28dd9f6c3848137d98c35cde69f53e8566e3ec51460c49e
|
07164a214dfd06454e9353499d8985182139580740dc316560f4ae9a200d038c
|
state/report/txt_hash |
db3b34cb5a9ecb0c6c96d19237cea60fb287149819eabe3eac0eeb91f1ae824c
|
c6c5cd1ede1e5e08df124e95c5002c67e29cad98c06f60910a8786d9960bcfcc
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dec0c24721da271f7ec51a6b8ecd505a665979a16fc1f0556815d8cc491eeaa1
|
b724a9c167abf2c7f462eb3162c453924e4b8383e1ab2e3f562f898fa70a03e2
|
state/st/txt_hash |
6af01ca93f8e3d9abf619850db98863c3b7f269996437be71022cd8dfab2f1bc
|
4cbaf3926352cd6b7cbf819bd0629806c5430911854d145e1328dba72e735776
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2014/60
|
ANSSI-CC-2014/46
|
heuristics/cert_lab |
SERMA
|
THALES
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_sars |
ATE_COV.2, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, ADV_IMP.1, ALC_DVS.2, ADV_FSP.5, ALC_LCD.1, ADV_TDS.4, ATE_FUN.1, ALC_CMS.5 |
ATE_COV.2, AGD_OPE.1, ADV_ARC.1, AGD_PRE.1, ALC_TAT.2, ADV_INT.2, ALC_CMC.4, ALC_DEL.1, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, ADV_IMP.1, ALC_DVS.2, ADV_FSP.5, ALC_LCD.1, ADV_TDS.4, ATE_FUN.1, ALC_CMS.5 |
heuristics/extracted_versions |
3.1 |
4.1, 3.8, 3.7 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2013/61 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2013/61 |
None
|
heuristics/scheme_data |
- product:
Microcontrôleurs sécurisés SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 et SB23ZD04 incluant optionnellement la librairie cryptographique NesLib révision 3.1
- url:
https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-sc23z018-sc23zd12-sc23zd08-sc23zd04-sb23zd18-0
- description:
Le produits certifiés sont les « Microcontrôleurs sécurisés SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 et SB23ZD04 incluant optionnellement la librairie cryptographique NesLib révision 3.1, Référence maskset K390A, révision interne H » développés par STMicroelectronics.
Le microcontrôleur seul n'est pas un produit utilisable en tant que tel. Il est destiné à héberger u
- sponsor:
STMicroelectronics
- developer:
STMicroelectronics
- cert_id:
2014/60
- level:
EAL5+
- enhanced:
- cert_id:
2014/60
- certification_date:
21/10/2014
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
BSI_PP_0035-2007
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-60en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2014/10/ANSSI-CC-2014_60en.pdf
|
- product:
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
- url:
https://cyber.gouv.fr/produits-certifies/microcontroleur-securise-st33g1m2-revision-f-firmware-revision-9-incluant
- description:
Le produit certifié est le « Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8 » développé par STMicroelectronics.
Les produits dérivés du ST33G1M2 inclus dans cette plateforme sont définis par une série d'options matérielles ou logicielles configu
- sponsor:
STMicroelectronics
- developer:
STMicroelectronics
- cert_id:
2014/46
- level:
EAL5+
- expiration_date: 18 Octobre 2024
- enhanced:
- cert_id:
2014/46
- certification_date:
21/07/2014
- expiration_date:
18/10/2024
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
THALES (TCS – CNES)
- level:
EAL5+
- protection_profile:
BSI_PP_0035-2007
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2 et AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-46en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2014/07/ANSSI-CC-2014-46-Certification-Report.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/2014/07/certificat-anssi-cc-2014_46-s05.pdf
|
heuristics/scheme_data/cert_id |
2014/60
|
2014/46
|
heuristics/scheme_data/description |
Le produits certifiés sont les « Microcontrôleurs sécurisés SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 et SB23ZD04 incluant optionnellement la librairie cryptographique NesLib révision 3.1, Référence maskset K390A, révision interne H » développés par STMicroelectronics.
Le microcontrôleur seul n'est pas un produit utilisable en tant que tel. Il est destiné à héberger u
|
Le produit certifié est le « Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8 » développé par STMicroelectronics.
Les produits dérivés du ST33G1M2 inclus dans cette plateforme sont définis par une série d'options matérielles ou logicielles configu
|
heuristics/scheme_data/developer |
STMicroelectronics
|
STMicroelectronics
|
heuristics/scheme_data/enhanced |
- cert_id:
2014/60
- certification_date:
21/10/2014
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
Serma Technologies
- level:
EAL5+
- protection_profile:
BSI_PP_0035-2007
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-60en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2014/10/ANSSI-CC-2014_60en.pdf
|
- cert_id:
2014/46
- certification_date:
21/07/2014
- expiration_date: 18/10/2024
- category:
Micro-circuits
- cc_version:
Critères Communs version 3.1r4
- developer:
STMicroelectronics
- sponsor:
STMicroelectronics
- evaluation_facility:
THALES (TCS – CNES)
- level:
EAL5+
- protection_profile:
BSI_PP_0035-2007
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2 et AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-46en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2014/07/ANSSI-CC-2014-46-Certification-Report.pdf
- cert_link: https://cyber.gouv.fr/sites/default/files/2014/07/certificat-anssi-cc-2014_46-s05.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2 et AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Micro-circuits
|
Micro-circuits
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r4
|
Critères Communs version 3.1r4
|
heuristics/scheme_data/enhanced/cert_id |
2014/60
|
2014/46
|
heuristics/scheme_data/enhanced/certification_date |
21/10/2014
|
21/07/2014
|
heuristics/scheme_data/enhanced/developer |
STMicroelectronics
|
STMicroelectronics
|
heuristics/scheme_data/enhanced/evaluation_facility |
Serma Technologies
|
THALES (TCS – CNES)
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
BSI_PP_0035-2007
|
BSI_PP_0035-2007
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2014/10/ANSSI-CC-2014_60en.pdf
|
https://cyber.gouv.fr/sites/default/files/2014/07/ANSSI-CC-2014-46-Certification-Report.pdf
|
heuristics/scheme_data/enhanced/sponsor |
STMicroelectronics
|
STMicroelectronics
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-60en.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2014-46en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
Microcontrôleurs sécurisés SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 et SB23ZD04 incluant optionnellement la librairie cryptographique NesLib révision 3.1
|
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
|
heuristics/scheme_data/sponsor |
STMicroelectronics
|
STMicroelectronics
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/microcontroleurs-securises-sc23z018-sc23zd12-sc23zd08-sc23zd04-sb23zd18-0
|
https://cyber.gouv.fr/produits-certifies/microcontroleur-securise-st33g1m2-revision-f-firmware-revision-9-incluant
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
certificat ANSSI-CC-2014_46-S05.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
1913229
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Producer:
GPL Ghostscript 9.50
- /CreationDate:
D:20210318180237+01'00'
- /ModDate:
D:20210318180237+01'00'
- /Title:
Microsoft Word - certificat ANSSI-CC-2014_46-S05.docx
- /Creator:
PScript5.dll Version 5.2.2
- /Author:
jchuzel
- pdf_hyperlinks:
|
pdf_data/report_filename |
ANSSI-CC-2014_60en.pdf
|
ANSSI-CC-2014-46.pdf
|
pdf_data/report_frontpage/FR/cc_security_level |
EAL5 Augmented ALC_DVS.2, AVA_VAN.5
|
EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
|
pdf_data/report_frontpage/FR/cc_version |
Common criteria version 3.1 revision 4
|
CC version 3.1 révision 4
|
pdf_data/report_frontpage/FR/cert_id |
ANSSI-CC-2014/60
|
ANSSI-CC-2014/46
|
pdf_data/report_frontpage/FR/cert_item |
SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 and SB23ZD04 Secure microcontrollers with optional cryptographic library NesLib revision 3.1
|
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
|
pdf_data/report_frontpage/FR/cert_item_version |
/version Maskset reference K390A, internal revision H
|
Référence maskset K8H0A, révision interne F, firmware révision 9
|
pdf_data/report_frontpage/FR/cert_lab |
Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
|
THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
|
pdf_data/report_frontpage/FR/developer |
STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
|
STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France
|
pdf_data/report_frontpage/FR/match_rules |
Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer (.+)Evaluation facility(.+)Mutual Recognition Agreements
|
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
|
pdf_data/report_frontpage/FR/ref_protection_profiles |
BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2014/60:
20
- ANSSI-CC-2013/61:
2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
- ALC_DVS.2:
2
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
2
|
3
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 |
3
|
2
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL5:
1
- EAL4:
2
- EAL 5:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 7:
1
- EAL 5 augmented: 1
|
- EAL5:
2
- EAL4:
2
- EAL7:
1
- EAL 1:
1
- EAL 3:
1
- EAL 5:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
2
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 |
2
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5 |
1
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library/Neslib |
- NesLib v3.1:
1
- NesLib 3.1:
2
- NESLIB 3.1:
1
|
- NesLib v4.1:
3
- NesLib 4.1:
3
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- Serma Technologies:
1
- SERMA:
2
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS31 |
3
|
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
pdf_data/report_keywords/symmetric_crypto/AES_competition |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES |
1
|
2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/STMicroelectronics/STMicroelectronics |
22
|
16
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Duquesnoy
|
Duquesnoy
|
pdf_data/report_metadata//CreationDate |
D:20150209153210+01'00'
|
D:20140721174339+02'00'
|
pdf_data/report_metadata//Creator |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//Keywords |
ANSSI-CC-CER-F-07.014
|
ANSSI-CC-CER-F-07.010
|
pdf_data/report_metadata//ModDate |
D:20150209153210+01'00'
|
D:20140721174339+02'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Microsoft® Word 2010
|
pdf_data/report_metadata//Subject |
SC23Z018, SC23ZD12, SC23ZD08, SC23ZD04, SB23ZD18, SB23ZD12, SB23ZD08 and SB23ZD04 Secure microcontrollers with optional cryptographic library NesLib revision 3.1
|
Microcontrôleur sécurisé ST33G1M2 révision F, Firmware révision 9, incluant optionnellement la bibliothèque cryptographique Neslib 4.1 et la bibliothèque MIFARE® DESFire® EV1 révision 3.7 ou 3.8
|
pdf_data/report_metadata//Title |
ANSSI-CC-2014/60
|
ANSSI-CC-2014/46
|
pdf_data/report_metadata/pdf_file_size_bytes |
563511
|
783296
|
pdf_data/report_metadata/pdf_hyperlinks |
http://www.ssi.gouv.fr/, mailto:[email protected] |
http://www.ssi.gouv.fr/, mailto:[email protected] |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
19
|
20
|
pdf_data/st_filename |
ANSSI_cible2014_27_LITE.pdf
|
ST33G1M2_SECURITY_TARGET_PUBLIC_SMD_ST33G_ST_13_002_v2_3.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
4
|
3
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 |
55
|
74
|
pdf_data/st_keywords/cc_sar/ADO |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP:
4
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.1:
1
- ADV_INT.2:
1
- ADV_TDS.4:
1
- ADV_ARC:
2
- ADV_IMP:
1
|
- ADV_FSP:
4
- ADV_ARC.1:
1
- ADV_FSP.5:
3
- ADV_IMP.1:
1
- ADV_INT.2:
1
- ADV_TDS.4:
1
- ADV_ARC:
2
- ADV_IMP:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
4
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV:
3
- ATE_COV.2:
1
- ATE_DPT.3:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV:
3
- ATE_COV.2:
1
- ATE_DPT.3:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 |
3
|
4
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5:
17
- EAL 5:
2
- EAL4:
1
- EAL 5 augmented:
2
|
- EAL:
- EAL5:
17
- EAL 5:
2
- EAL4:
1
- EAL 5 augmented:
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_RNG.1:
6
- FCS_COP.1:
26
- FCS_CKM.1:
24
- FCS_RNG:
1
- FCS_CKM.4:
5
- FDP:
- FDP_ITT.1:
7
- FDP_IFC.1:
9
- FDP_ACC.2:
12
- FDP_ACF.1:
11
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_CKM.2:
1
- FDP_ACC.1:
1
- FMT:
- FMT_LIM.1:
8
- FMT_LIM.2:
9
- FMT_MSA.3:
10
- FMT_SMF.1:
10
- FMT_MSA.1:
6
- FMT_LIM:
1
- FMT_MSA.2:
1
- FMT_SMR.1:
2
- FPT:
- FPT_FLS.1:
8
- FPT_PHP.3:
7
- FPT_ITT.1:
6
- FRU:
|
- FAU:
- FCS:
- FCS_RNG.1:
7
- FCS_COP.1:
34
- FCS_CKM.1:
21
- FCS_CKM.4:
13
- FCS_RNG:
1
- FDP:
- FDP_ITT.1:
7
- FDP_IFC.1:
15
- FDP_ACC.2:
12
- FDP_ACF.1:
47
- FDP_ITC.1:
14
- FDP_ACC.1:
42
- FDP_ITC.2:
13
- FDP_ROL.1:
9
- FDP_RIP.1:
9
- FDP_CKM.2:
1
- FDP_SMF.1:
2
- FDP_SMR.1:
1
- FIA:
- FIA_UID.2:
11
- FIA_UAU.2:
9
- FIA_UAU.5:
10
- FIA_UID.1:
2
- FMT:
- FMT_LIM.1:
18
- FMT_LIM.2:
17
- FMT_MSA.3:
46
- FMT_MSA.1:
36
- FMT_SMF.1:
27
- FMT_SMR.1:
22
- FMT_MTD.1:
9
- FMT_LIM:
1
- FMT_MSA.2:
1
- FMT_ITC.1:
1
- FPR:
- FPT:
- FPT_FLS.1:
10
- FPT_PHP.3:
7
- FPT_ITT.1:
6
- FPT_TDC.1:
10
- FPT_RPL.1:
10
- FPT_TRP.1:
6
- FRU:
- FRU_FLT.2:
9
- FRU_RSA.2:
9
- FTP:
- FTP_TRP.1:
6
- FTP_TRP.1.3:
2
- FTP_ITC.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
24
|
21
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
5
|
13
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
26
|
34
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 |
6
|
7
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ITT.1:
7
- FDP_IFC.1:
9
- FDP_ACC.2:
12
- FDP_ACF.1:
11
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_CKM.2:
1
- FDP_ACC.1:
1
|
- FDP_ITT.1:
7
- FDP_IFC.1:
15
- FDP_ACC.2:
12
- FDP_ACF.1:
47
- FDP_ITC.1:
14
- FDP_ACC.1:
42
- FDP_ITC.2:
13
- FDP_ROL.1: 9
- FDP_RIP.1: 9
- FDP_CKM.2:
1
- FDP_SMF.1: 2
- FDP_SMR.1: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
1
|
42
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
11
|
47
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CKM.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
9
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM.1:
8
- FMT_LIM.2:
9
- FMT_MSA.3:
10
- FMT_SMF.1:
10
- FMT_MSA.1:
6
- FMT_LIM:
1
- FMT_MSA.2:
1
- FMT_SMR.1:
2
|
- FMT_LIM.1:
18
- FMT_LIM.2:
17
- FMT_MSA.3:
46
- FMT_MSA.1:
36
- FMT_SMF.1:
27
- FMT_SMR.1:
22
- FMT_MTD.1: 9
- FMT_LIM:
1
- FMT_MSA.2:
1
- FMT_ITC.1: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 |
8
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 |
9
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
6
|
36
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
10
|
46
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
10
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
2
|
22
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_FLS.1:
8
- FPT_PHP.3:
7
- FPT_ITT.1:
6
|
- FPT_FLS.1:
10
- FPT_PHP.3:
7
- FPT_ITT.1:
6
- FPT_TDC.1: 10
- FPT_RPL.1: 10
- FPT_TRP.1: 6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
8
|
10
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FRU |
|
- FRU_FLT.2:
9
- FRU_RSA.2: 9
|
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 |
8
|
9
|
pdf_data/st_keywords/certification_process/OutOfScope |
- out of scope:
1
- ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded: 1
- 33 The Security IC Embedded Software (ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib when it is embedded. 34 The SC23Zxxx optionally comprises a: 1
|
- out of scope:
1
- ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded: 1
- 31 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib and DESFire, when they are embedded. 32 The TOE optionally: 1
|
pdf_data/st_keywords/certification_process/OutOfScope/out of scope |
1
|
1
|
pdf_data/st_keywords/cipher_mode/CBC/CBC |
4
|
6
|
pdf_data/st_keywords/cipher_mode/ECB/ECB |
2
|
4
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library/Neslib |
- NESLIB 3.1:
2
- NesLib 3.1:
1
|
- NESLIB 4.1:
1
- NesLib 4.1:
2
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
2
|
3
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
5
|
8
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-224:
4
- SHA-256:
3
- SHA-384:
4
- SHA-512:
1
- SHA-2: 1
|
- SHA-224:
6
- SHA-256:
9
- SHA-384:
6
- SHA-512:
4
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
4
|
6
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
3
|
9
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 |
4
|
6
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
1
|
4
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RND |
6
|
6
|
pdf_data/st_keywords/randomness/TRNG/TRNG |
2
|
3
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction |
9
|
9
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
2
|
4
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent:
8
- Physical Probing:
4
- physical probing:
3
- side channel:
5
- DPA: 5
- SPA: 1
|
- Leak-Inherent:
8
- Physical Probing:
4
- physical probing:
3
- side channel:
6
|
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent |
8
|
8
|
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing |
4
|
4
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
3
|
pdf_data/st_keywords/side_channel_analysis/SCA/side channel |
5
|
6
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3:
3
- FIPS PUB 197:
3
- FIPS PUB 180-1:
3
- FIPS PUB 140-2:
9
- FIPS PUB 180-2:
2
- FIPS PUB 186:
3
- PKCS:
- BSI:
- ISO:
- ISO/IEC 9797-1:
2
- ISO/IEC 10118-:
2
- ISO/IEC 9796-2:
5
- ISO/IEC 10116:
5
- ISO/IEC 14888:
2
- ISO/IEC 9796:
1
- ISO/IEC 9797:
1
- CC:
- CCMB-2012-09-002:
11
- CCMB-2012-09-003:
2
- CCMB-2012-09-001:
3
|
- FIPS:
- FIPS PUB 46-3:
3
- FIPS PUB 197:
4
- FIPS PUB 180-4:
5
- FIPS PUB 140-2:
5
- FIPS PUB 198-1:
2
- FIPS 186-3:
2
- NIST:
- NIST SP 800-38B:
2
- NIST SP 800-90A:
5
- PKCS:
- BSI:
- ISO:
- ISO/IEC 7816-3:
1
- ISO/IEC 9797-1:
3
- ISO/IEC 10116:
7
- ISO/IEC 14888:
2
- ISO/IEC 9797:
1
- CC:
- CCMB-2012-09-002:
40
- CCMB-2012-09-003:
2
- CCMB-2012-09-001:
2
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 |
3
|
3
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 |
3
|
2
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 |
11
|
40
|
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 |
2
|
2
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 46-3:
3
- FIPS PUB 197:
3
- FIPS PUB 180-1: 3
- FIPS PUB 140-2:
9
- FIPS PUB 180-2: 2
- FIPS PUB 186: 3
|
- FIPS PUB 46-3:
3
- FIPS PUB 197:
4
- FIPS PUB 180-4: 5
- FIPS PUB 140-2:
5
- FIPS PUB 198-1: 2
- FIPS 186-3: 2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 140-2 |
9
|
5
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
3
|
4
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
3
|
3
|
pdf_data/st_keywords/standard_id/ISO |
- ISO/IEC 9797-1:
2
- ISO/IEC 10118-: 2
- ISO/IEC 9796-2: 5
- ISO/IEC 10116:
5
- ISO/IEC 14888:
2
- ISO/IEC 9796: 1
- ISO/IEC 9797:
1
|
- ISO/IEC 7816-3: 1
- ISO/IEC 9797-1:
3
- ISO/IEC 10116:
7
- ISO/IEC 14888:
2
- ISO/IEC 9797:
1
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 10116 |
5
|
7
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14888 |
2
|
2
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9797 |
1
|
1
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9797-1 |
2
|
3
|
pdf_data/st_keywords/standard_id/PKCS/PKCS #1 |
9
|
5
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES:
26
- AES-128:
1
- AES-192:
1
- AES-256:
1
- DES:
- constructions:
- MAC:
- HMAC:
3
- CBC-MAC:
3
- CMAC:
2
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES |
|
- AES:
26
- AES-128: 1
- AES-192: 1
- AES-256: 1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
11
|
26
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES |
5
|
5
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
18
|
26
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- STMicroelectronics:
- Philips:
|
- Infineon:
- STMicroelectronics:
- Philips:
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Christiane DROULERS
|
Christiane DROULERS
|
pdf_data/st_metadata//CreationDate |
D:20140828154417Z
|
D:20140630112314Z
|
pdf_data/st_metadata//Creator |
FrameMaker 7.2
|
FrameMaker 7.2
|
pdf_data/st_metadata//ModDate |
D:20140828154624Z
|
D:20140707154401+02'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 9.0.0 (Windows)
|
Acrobat Distiller 9.0.0 (Windows)
|
pdf_data/st_metadata//Title |
SMD_SC23Z018_V1_7.book
|
SMD_ST33G_V2_3.book
|
pdf_data/st_metadata/pdf_file_size_bytes |
348939
|
636249
|
pdf_data/st_metadata/pdf_hyperlinks |
http://www.st.com |
http://www.st.com |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
55
|
89
|
dgst |
f89ed74b6c577fe6
|
f2a284d2553d3565
|