Hardware-based attacks to compromise the cryptographic security of an election system | IEEE Conference Publication | IEEE Xplore