A.: Detecting Hidden Leakages. (2014)

by A Moradi, S Guilley, Heuser
Venue:12th International Conference on Applied Cryptography and Network Security,