The Keys to the Kingdom: A deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader.
Phil VachonPublished in: ACM Queue (2021)
Keyphrases
- private key
- public key
- security analysis
- secret key
- digital signature
- key distribution
- signature scheme
- image encryption
- ciphertext
- secret sharing scheme
- encryption scheme
- smart card
- response time
- security requirements
- signcryption scheme
- authentication protocol
- data distribution
- mutual authentication
- key management
- resource constrained
- resource constraints
- cost effective