Simulating For Security

When we think of the field of cryptography, we often tend to think of math-intensive software encryption schemes, algorithms trying to prevent sensitive data from getting into the wrong hands, and hackers poring over code searching for potential loopholes in data sent over secure channels. However, we must also consider the fact that data has to physically make its way through transistors, p... » read more