Protecting the code against side attacks using chaotically controlled clock and supply | IEEE Conference Publication | IEEE Xplore