No credit card required
About the Authors
About the Technical Reviewers
Chapter 1: History of the TPM
Why a TPM?
History of Development of the TPM Specification from 1.1b to 1.2
How TPM 2.0 Developed from TPM 1.2
History of TPM 2.0 Specification Development
Chapter 2: Basic Security Concepts
Attacks on the Algorithm Itself
Secure Hash (or Digest)
HMAC: Message Authentication Code
KDF: Key Derivation Function
Authentication or Authorization ...