Cryptographic Security Through a Hardware Root of Trust | Publicación