Fig. 2From: A secure and highly efficient first-order masking scheme for AES linear operationsRunning time proportion of non-linear and linear operations in AES higher order masking schemesBack to article page