Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse | IEEE Conference Publication | IEEE Xplore