Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage | IEEE Conference Publication | IEEE Xplore