Information theoretical evaluation of the bucketing technique to mitigate timing attacks | IEEE Conference Publication | IEEE Xplore