Ensuring tight computational security against higher-order DPA attacks | IEEE Conference Publication | IEEE Xplore