Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher | Publicación