Research Article
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Figure 3
Mask recovery success rate as a function of number of masks attacked.