\RU{\chapter{Примеры разбора закрытых (proprietary) форматов файлов}}
\EN{\chapter{Examples of reversing proprietary file formats}}
\DE{\chapter{Beispiele für das Reverse Engineering proprietärer Dateiformate}}

% sections
\input{ff/XOR/main}

\EN{\input{ff/entropy/main_EN}}
\RU{\input{ff/entropy/main_RU}}

\EN{\input{ff/millenium/main_EN}}
\RU{\input{ff/millenium/main_RU}}

\EN{\input{ff/fortune/main_EN}}
\RU{\input{ff/fortune/main_RU}}

\EN{\input{ff/Oracle_SYM/main_EN}}
\RU{\input{ff/Oracle_SYM/main_RU}}

\EN{\input{ff/Oracle_MSB/main_EN}}
\RU{\input{ff/Oracle_MSB/main_RU}}

\EN{\input{ff/exercise_EN}}
\RU{\input{ff/exercise_RU}}

\section{\EN{Further reading}\RU{Дальнейшее чтение}}

\href{https://yurichev.com/mirrors/SSTIC2016-Article-cryptanalyse_en_boite_noire_de_chiffrement_proprietaire-capillon.pdf}{Pierre Capillon -- Black-box cryptanalysis of home-made encryption algorithms: a practical case study}.

