Tutorial: Information Leakage from Cryptographic Techniques | IEEE Conference Publication | IEEE Xplore