Please remember to print your answer for each day's paper question on a sheet
of paper and hand it in at the beginning of class.
What are some other situations where an adversary may be able
to learn confidential information by timing certain operations?
Propose some ideas for how an application developer might mitigate
such vulnerabilities.