B Robisson, M Agoyan, P Soquet, S Le-Henaff… - Journal of Cryptographic …, 2017 - Springer
Among other threats, secure components are subjected to physical attacks whose aim is to
recover the secret information they store. Most of the work carried out to protect these …