Return to Article Details Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis Download Download PDF