Protecting against vulnerability of encryption codes
Reducing vulnerability of encryption codes
Counter claim
The things that go wrong with real systems usually have little to do with the mathematical strength of encryption methods. People encrypt the wrong things, encrypt them the wrong way or simply leave the back door open.