Return to Article Details Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers Download Download PDF