Encrypting data in use for Dummies
TPMs usually are not built to give general computational capability. They do present some essential (read: “sluggish”) computation abilities: they will crank out random keys, encrypt small amounts of data using a mystery they maintain, and they are able to evaluate components of the method and maintain a log of those measurements in System Conf