M Yang, Q Meng, A Wang, X Liu - Cryptology ePrint Archive, 2020 - eprint.iacr.org
For template attacks, it is ideal if templates can be built for each (data, key) pair. However, it
requires a lot of power traces and computation. In this paper, firstly, the properties of the …