December 2007
Intermediate to advanced
384 pages
9h 30m
English
Chapter 7
[1] See http://www.trustedcomputinggroup.org/specs/TSS for the latest public version of the TSS specification.
[2] For more information on creating digital signatures, see Public Key Cryptography Standard #1 at https://www.rsa.com/rsalabs/node.asp?id=2133.
Chapter 9
[1] Please see “Optimal Asymmetric Encryption—How to Encrypt with RSA” at http://www.cdc.informatik.tu-darmstadt.de/TI/Lehre/WS02_03/Vorlesung/Kryptographie_I/oae.pdf for more information on OAEP.
Chapter 12
[1] Note that 6e16 possibilities have been searched with specialized hardware and a very large number of computers working in concert in about a day. It is likely that the NSA could crack 3e21 possibilities in less than a minute. If you have to protect your ...