Fig. 8From: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissionsThreshold values. Tth for every sample in recorded tracesBack to article page