Presenters: Antonín Dufka, Peeter Laud, Petr Švenda Loading… Taking too long? Reload document | Open in new tab previousLessons learned from blackbox analyses of software and hardware cryptographic implementationsnextBreaking the Estonian ID card revisited: tools and methods for security assessment