How to leak a secret from multiple sources | IEEE Conference Publication | IEEE Xplore