[1]
Levi, I. et al. 2019. Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations: And an Explanation Based on Externally-Amplified Couplings. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2019, 2 (Feb. 2019), 293–317. DOI:https://doi.org/10.13154/tches.v2019.i2.293-317.