ABSTRACT

In this chapter, we explore various ways an attacker might exploit an error made by the user(s) of a cipher or protocol, or even a hardware or software error. These errors may or may not relate to number theory. Many attacks on RSA in this chapter and the previous one are described in Boneh [12].