Integrating cryptography in the trusted computing base | IEEE Conference Publication | IEEE Xplore