Showing 65 - 72 of 136
Cryptography in Trusted Computing: an Introduction to Secure Hashing
Cryptography forms the foundation of many aspects of trusted computing. This article considers recent algorithms and cryptographic attacks, as well as some future directions for cryptography in deployed embedded systems.
04/24/2019