[1]
“Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations: And an Explanation Based on Externally-Amplified Couplings”, TCHES, vol. 2019, no. 2, pp. 293–317, Feb. 2019, doi: 10.13154/tches.v2019.i2.293-317.