I'm replying from memory, so this might be worth researching for yourself, but I remember a cryptography conference where someone was talking about how important it was to use constant-time algorithms to prevent leaking information about the number of bits that were set in keys and messages, and demonstrated that using balanced ternary allowed some really cool techniques.
Don't know if any of that has made it into the literature, but you could have a look.
Don't know if any of that has made it into the literature, but you could have a look.