Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds | IEEE Conference Publication | IEEE Xplore