Attacks
In this chapter, we'll mainly make two examples to show how the protocol could be attacked and some theoretical or practical mitigations against this.
These two examples are
In this chapter, we'll mainly make two examples to show how the protocol could be attacked and some theoretical or practical mitigations against this.
These two examples are