A Deep Dive into the Exploited Cryptographic Technology