Slicing up a perfect hardware masking scheme | IEEE Conference Publication | IEEE Xplore