Colloquium: On value of large-scale blackbox analysis of software and hardware cryptographic implementations