Publication

Making Masking Security Proofs Concrete - Or How to Evaluate the Security of any Leaking Device