Return to Article Details GE vs GM: Efficient side-channel security evaluations on full cryptographic keys Download Download PDF