Research Article

Analysis of Software Implemented Low Entropy Masking Schemes

Figure 2

, , and over (a) time samples using 1000 traces (b) and number of traces at the peak location.
(a)
(b)