Power analysis of hardware implementations protected with secret sharing | IEEE Conference Publication | IEEE Xplore