On 06/30/2014 05:49 PM, Billy Brumley wrote:
What cryptosystems, and furthermore protocols, you can attack and how
you carry out the attack very much depend on the nature of the
fault/defect and the details of the protocol.
Shameless self promotion: https://eprint.iacr.org/2011/633
Thanks,
This went to the cypherpunks list, but not to the others:
http://eprint.iacr.org/2014/508
Reversing stealthy dopant level trojans!
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography