On the Use of Information Redundancy When Designing Secure Chips | IEEE Conference Publication | IEEE Xplore