Comparing low and medium cost computer-based technologies suitable for cryptographic attacks | Publicación