How to Compute in the Presence of Leakage | IEEE Conference Publication | IEEE Xplore