Fig. 3From: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissionsVirtual model flowchart. The flowchart described how the performance metrics and security evaluation is performed on the cryptosystemBack to article page