In this talk, we will look at a collection of cryptanalysis problems suggested by side-channel attacks against public key cryptosystems, and how the techniques inspired by this work relate to a variety of different applications. We will learn how encryption keys can be recovered from the memory of a running computer, how to factor with partial information, and what this has to do with the recent development of fully homomorphic encryption.