Skip to Content
A Practical Guide to Trusted Computing
book

A Practical Guide to Trusted Computing

by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
December 2007
Intermediate to advanced content levelIntermediate to advanced
384 pages
9h 30m
English
IBM Press
Content preview from A Practical Guide to Trusted Computing

Footnotes

Chapter 7

[1] See http://www.trustedcomputinggroup.org/specs/TSS for the latest public version of the TSS specification.

[2] For more information on creating digital signatures, see Public Key Cryptography Standard #1 at https://www.rsa.com/rsalabs/node.asp?id=2133.

Chapter 9

[1] Please see “Optimal Asymmetric Encryption—How to Encrypt with RSA” at http://www.cdc.informatik.tu-darmstadt.de/TI/Lehre/WS02_03/Vorlesung/Kryptographie_I/oae.pdf for more information on OAEP.

Chapter 12

[1] Note that 6e16 possibilities have been searched with specialized hardware and a very large number of computers working in concert in about a day. It is likely that the NSA could crack 3e21 possibilities in less than a minute. If you have to protect your ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Trusted Computing

Trusted Computing

Dengguo Feng, Tsinghua University Tsinghua University Press
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
Trusted Computing Platforms: TCPA Technology in Context

Trusted Computing Platforms: TCPA Technology in Context

Siani Pearson, Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler

Publisher Resources

ISBN: 9780132398428Purchase book