J Waddle,
D Wagner - International Workshop on Cryptographic Hardware …, 2004 - Springer
Viable cryptosystem designs must address power analysis attacks, and masking is a
commonly proposed technique for defending against these side-channel attacks. It is …