Return to Article Details Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations Download Download PDF