Footnotes

Chapter 7

[1] See http://www.trustedcomputinggroup.org/specs/TSS for the latest public version of the TSS specification.

[2] For more information on creating digital signatures, see Public Key Cryptography Standard #1 at https://www.rsa.com/rsalabs/node.asp?id=2133.

Chapter 9

[1] Please see “Optimal Asymmetric Encryption—How to Encrypt with RSA” at http://www.cdc.informatik.tu-darmstadt.de/TI/Lehre/WS02_03/Vorlesung/Kryptographie_I/oae.pdf for more information on OAEP.

Chapter 12

[1] Note that 6e16 possibilities have been searched with specialized hardware and a very large number of computers working in concert in about a day. It is likely that the NSA could crack 3e21 possibilities in less than a minute. If you have to protect your ...

Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.