Fig. 5From: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissionsSecurity evaluation cases. a Case 1: Eve syncs with Alice and Bob. b Case 2: Eve syncs only with Alice. c Case 3: Eve intercepts channel and acts as Alice or BobBack to article page