Fig. 4From: A secure and highly efficient first-order masking scheme for AES linear operationsT-test on simulated leakages of Algorithm 2 and Algorithm 3 in SP schemeBack to article page