R Bardou,
R Focardi, Y Kawamoto, L Simionato… - Annual Cryptology …, 2012 - Springer
We show how to exploit the encrypted key import functions of a variety of different
cryptographic devices to reveal the imported key. The attacks are padding oracle attacks …