A Practical Guide to Trusted Computing
by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn
Footnotes
Chapter 7
[1] See http://www.trustedcomputinggroup.org/specs/TSS for the latest public version of the TSS specification.
[2] For more information on creating digital signatures, see Public Key Cryptography Standard #1 at https://www.rsa.com/rsalabs/node.asp?id=2133.
Chapter 9
[1] Please see “Optimal Asymmetric Encryption—How to Encrypt with RSA” at http://www.cdc.informatik.tu-darmstadt.de/TI/Lehre/WS02_03/Vorlesung/Kryptographie_I/oae.pdf for more information on OAEP.
Chapter 12
[1] Note that 6e16 possibilities have been searched with specialized hardware and a very large number of computers working in concert in about a day. It is likely that the NSA could crack 3e21 possibilities in less than a minute. If you have to protect your ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access