7. Cryptanalysis in Practice
7.1 | Introduction |
7.2 | Side Channel Attacks |
7.3 | Backdoor Attacks |
Chapter Summary | |
Sugestions for Further Reading |
A man cannot be too careful in the choice of his enemies.
—Oscar Wilde (1854–1900), The Picture of Dorian Gray, 1891
If you reveal your secrets to the wind you should not blame the wind for revealing them to the trees.
—Kahlil Gibran (1883–1931)
There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult.
—Charles Antony Richard Hoare
Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.