Return to Article Details Threshold Implementations in Software: Micro-architectural Leakages in Algorithms Download Download PDF