Analysis of the security of linear blinding techniques from an information theoretical point of view