1. Kerckhoffs A (2014). La cryptographie militaire. Nabu Press, 2014.
2. Trusted Computing Group (TCG)(2016). Trusted Platform Module Library: Part 1: Architecture Family 2.0, Revision 1.38. Trusted Computing Group (TCG).
3. NXP Semiconductors (2020). AN4581 i.MX Secure Boot on HABv4 Supported Devices. NXP Semiconductors.
4. Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Olk W (2008). Internet RFC 5280 – Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Network Working Group, https://tools.ietf.org/html/rfc5280, 2008.
5. Beutelspacher A, Schwenk J,Wolfenstetter K-D (2018). Moderne Verfahren der Kryptographie. Springer Spektrum, 2018.