I. Introduction
Cryptographic algorithm is an important part of cryptography and the core system for realizing information confidentiality. Its security analysis has always been a very active topic in cryptographic research. The process of using intermediate state information to analyze a cryptographic algorithm is called side-channel attack. The main attack types include timing attack [1], power attack[2], electromagnetic analysis [3] and fault attack [4]. The advantages of side-channel attacks include many information collection methods, simple analysis methods, and high key recovery efficiency, which bring new challenges to cryptography and information security.