Structured Leakage and Applications to Cryptographic Constant-Time and Cost | Publicación