A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks | Publicación