6 min read
The Weakest Link in Many Cryptosystems – Part 1 of 2
Introduction It is well-known and appreciated by most users - even if often ignored(!) - that if you choose a weak password, you are exposing...
6 min read
Introduction It is well-known and appreciated by most users - even if often ignored(!) - that if you choose a weak password, you are exposing...
6 min read
Introducing the TPM The Trusted Platform Module (TPM) is a special purpose microcontroller designed by the Trusted Computing Group, which interfaces...
4 min read
This article provides an overview of GlobalPlatform (GP) Key Management and includes a proposed architecture for an efficient GP Key Management...
3 min read
A New Cryptographic Primitive? By far the oldest and perhaps also the best-known goal of cryptographic methods is the protection of secrecy, or...
4 min read
Trusted Service Manager (TSM) is a relatively new role required in a mobile Near Field Communication (NFC) ecosystem. The core services a Trusted...