Skip to main content
Publication

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of any Leaking Device