“…Since then multiple side channels have been demonstrated, exploiting various effects, such as timing [1,11,14,15], power consumption [34], electromagnetic (EM) emanations [17,27,44], shared microarchitectural components [29,50], and even acoustic and photonic emanations [4,30,35,47]. These side channels pose a severe risk to the security of systems, and in particular to cryptographic implementations, and effective side channel attacks have been demonstrated against block and stream ciphers [31,45], public key systems, both traditional [22,41] and post quantum [43], cryptographic primitives implemented in real-world devices [5,24], and even non-cryptographic algorithms [8].…”