@article{schnorr91, author = {Schnorr, Claus}, year = {1991}, month = {01}, pages = {161-174}, title = {Efficient signature generation by smart cards}, volume = {4}, journal = {Journal of Cryptology}, doi = {10.1007/BF00196725} } @article{cramer98, author = {Cramer, R. and Shoup, V.}, year = {1998}, month = {01}, pages = {}, title = {A practical public-key cryptosystem secure against adaptive chosen ciphertexts attacks} } @inproceedings{camenisch04, author = {Camenisch, Jan and Lysyanskaya, Anna}, year = {2004}, month = {08}, pages = {56-72}, title = {Signature Schemes and Anonymous Credentials from Bilinear Maps}, volume = {3152/2004}, journal = {Signature Schemes and Anonymous Credentials from Bilinear Maps}, doi = {10.1007/978-3-540-28628-8_4} } @inproceedings{camenisch16, author = {Camenisch, Jan and Drijvers, Manu and Lehmann, Anja}, year = {2016}, month = {03}, pages = {234-264}, title = {Universally Composable Direct Anonymous Attestation}, volume = {9615}, isbn = {978-3-662-49386-1}, doi = {10.1007/978-3-662-49387-8_10} } @inproceedings{barreto05, author = {Barreto, Paulo and Naehrig, Michael}, year = {2005}, month = {08}, pages = {319-331}, title = {Pairing-Friendly Elliptic Curves of Prime Order}, volume = {3897}, journal = {LNCS}, doi = {10.1007/11693383_22} } @inproceedings{chen10, author = {Chen, Liqun and Page, Dan and Smart, Nigel}, year = {2010}, month = {11}, pages = {223-237}, title = {On the Design and Implementation of an Efficient DAA Scheme}, doi = {10.1007/978-3-642-12510-2_16} } @inproceedings{camenisch17, author = {Camenisch, Jan and Chen, Liqun and Drijvers, Manu and Lehmann, Anja and Novick, David and Urian, Rainer}, year = {2017}, month = {05}, pages = {901-920}, title = {One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation}, doi = {10.1109/SP.2017.22} } @article{winkler11, author = {Winkler, Thomas and Rinner, Bernhard}, year = {2011}, month = {01}, pages = {}, title = {Securing Embedded Smart Cameras with Trusted Computing}, volume = {2011}, journal = {EURASIP J. Wireless Comm. and Networking}, doi = {10.1155/2011/530354} } @book{arthur15, author = {Arthur, Will and Challener, David and Goldman, Kenneth}, year = {2015}, month = {01}, pages = {}, title = {A Practical Guide to TPM 2.0}, doi = {10.1007/978-1-4302-6584-9} } @book{book, author = {Proudler, Graeme and Chen, Liqun and Dalton, Chris}, year = {2014}, month = {01}, pages = {}, title = {Trusted Computing Platforms}, doi = {10.1007/978-3-319-08744-3} } @online{pornkitprasan19-diskencryption, author = {Pawit Pornkitprasan}, year = {2019}, month = {07}, title = {Full Disk Encryption on Arch Linux backed by TPM 2.0}, url = {https://medium.com/@pawitp/full-disk-encryption-on-arch-linux-backed-by-tpm-2-0-c0892cab9704}, urldate = {27.02.2020} } @online{pornkitprasan19-tpmtools, author = {Pawit Pornkitprasan}, year = {2019}, month = {10}, title = {Its certainly annoying that TPM2-Tools like to change their command line parameters}, url = {https://medium.com/@pawitp/its-certainly-annoying-that-tpm2-tools-like-to-change-their-command-line-parameters-d5d0f4351206}, urldate = {27.02.2020} } @online{pornkitprasan19-secureboot, author = {Pawit Pornkitprasan}, year = {2019}, month = {07}, title = {The Correct Way to use Secure Boot with Linux}, url = {https://medium.com/@pawitp/the-correct-way-to-use-secure-boot-with-linux-a0421796eade}, urldate = {27.02.2020} } @online{tevora18, author = {Tevora}, year = {2018}, month = {06}, title = {Configuring Secure Boot + TPM 2}, url = {https://threat.tevora.com/secure-boot-tpm-2/}, urldate = {27.02.2020} } @online{smith18-dealing-sb, author = {Rod Smith}, year = {2018}, month = {07}, title = {Managing EFI Boot Loaders for Linux: Dealing with Secure Boot}, url = {https://www.rodsbooks.com/efi-bootloaders/secureboot.html}, urldate = {27.02.2020} } @online{smith18-controlling-sb, author = {Rod Smith}, year = {2018}, month = {07}, title = {Managing EFI Boot Loaders for Linux: Controlling Secure Boot}, url = {https://www.rodsbooks.com/efi-bootloaders/controlling-sb.html}, urldate = {27.02.2020} } @online{corbet16, author = {Jonathan Corbet}, year = {2016}, month = {02}, title = {Protecting systems with the TPM}, url = {https://lwn.net/Articles/674751/}, urldate = {27.02.2020} } @online{kernelsecurity18, author = {}, year = {2018}, month = {03}, title = {Linux Kernel Integrity}, url = {https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity}, urldate = {27.02.2020} } @inproceedings{chevalier19, author = {Chevalier, Ronny and Cristalli, Stefano and Hauser, Christophe and Shoshitaishvili, Yan and Wang, Ruoyu and Kruegel, Christopher and Vigna, Giovanni and Bruschi, Danilo and Lanzi, Andrea}, year = {2019}, month = {03}, pages = {315-325}, title = {BootKeeper: Validating Software Integrity Properties on Boot Firmware Images}, doi = {10.1145/3292006.3300026} } @inproceedings{butterworth13, author = {Butterworth, John and Kallenberg, Corey and Kovah, Xeno and Herzog, Amy}, year = {2013}, month = {11}, pages = {25-36}, title = {BIOS chronomancy: Fixing the core root of trust for measurement}, journal = {Proceedings of the ACM Conference on Computer and Communications Security}, doi = {10.1145/2508859.2516714} }