Author:Djonon Tsague, Hippolyte; Twala, BDate:Dec 2016From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extracting other information ...Read more