Fig. 5From: A secure and highly efficient first-order masking scheme for AES linear operationsT-test on simulated leakages of Algorithm 2 and Algorithm 3 in RSMv1 schemeBack to article page