Analyzes Yubico's proposal for asynchronous remote key generation in WebAuthn, focusing on security, performance, and compatibility with public key protocols.
Explores trusted computing, confidentiality, integrity, and side-channel attacks, emphasizing real-world examples and the challenges of ensuring security.