Formal security evaluation of hardware Boolean masking against second-order attacks | IEEE Conference Publication | IEEE Xplore