Presenters: Antonín Dufka, Peeter Laud, Petr Švenda Loading… Taking too long? Reload document | Open in new tab previousLessons learned from blackbox analyses of software and hardware cryptographic implementations