Cryptographic design vulnerabilities

B. Schneier
1998 Computer  
doi:10.1109/2.708447 fatcat:gumayzqfczbfjp5l5nibkdobza