[1]
I. Levi, D. Bellizia, and F.-X. Standaert, “Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations: And an Explanation Based on Externally-Amplified Couplings”, TCHES, vol. 2019, no. 2, pp. 293–317, Feb. 2019.