An attack that involves sending carefully crafted ciphertexts to a system and analyzing the response to learn information about the system's secret keys.
An attack that involves sending carefully crafted ciphertexts to a system and analyzing the response to learn information about the system's secret keys.