O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Footnotes

Chapter 7

[1] See http://www.trustedcomputinggroup.org/specs/TSS for the latest public version of the TSS specification.

[2] For more information on creating digital signatures, see Public Key Cryptography Standard #1 at https://www.rsa.com/rsalabs/node.asp?id=2133.

Chapter 9

[1] Please see “Optimal Asymmetric Encryption—How to Encrypt with RSA” at http://www.cdc.informatik.tu-darmstadt.de/TI/Lehre/WS02_03/Vorlesung/Kryptographie_I/oae.pdf for more information on OAEP.

Chapter 12

[1] Note that 6e16 possibilities have been searched with specialized hardware and a very large number of computers working in concert in about a day. It is likely that the NSA could crack 3e21 possibilities in less than a minute. If you have to protect your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required