“…Specifically, the following threats concerning leaks via electromagnetic radiation have been clearly identified: information on the screen of a desktop or notebook personal computer (PC) [Kuhn, 2011;Sekiguchi and Seto, 2011], information on the screen of a device such as a tablet or phone [Hayashi et al, 2014], information for business purposes calculated by the CPU of a PC [Zajic and Prvulovic, 2014], information output from a printer [Tosaka et al, 2006], keyboard input key information [Vuagnoux and Pasini, 2010], and secret key information in devices that process passwords [Agrawal et al, 2002].…”