Which of the following statement(s) is/are false for side channel attacks?
a. They exploit weaknesses in cryptographic algorithms.
b. They exploit weaknesses in algorithm implementations.
c. They do not require physical access to the device.
d. None of these.
Answer: a. They exploit weaknesses in cryptographic algorithms.