Power attacks on secure hardware based on early propagation of data | IEEE Conference Publication | IEEE Xplore