Technical note: Complementarity attacks and control vectors | IBM Journals & Magazine | IEEE Xplore