In addition to its usual complexity postulates, cryptography silently assumes that secrets can be physically protected in tamper-proof locations.
CITATION STYLE
Baek, Y. J., Gratzer, V., Kim, S. H., & Naccache, D. (2010). Extracting unknown keys from unknown algorithms encrypting unknown fixed messages and returning no results. In Information Security and Cryptography (Vol. 0, pp. 189–197). Springer International Publishing. https://doi.org/10.1007/978-3-642-14452-3_8
Mendeley helps you to discover research relevant for your work.