I. Introduction
In today's interconnected world, nearly everything from financial transactions to confidential military secrets are conducted online. Naturally, this has attracted attackers who wish to steal this information for their own gain. Although the encryption that is used to protect this data is mathematically secure, it was discovered in the late 90s that the implementation of these cryptographic algorithms could leak information about the secret key. These side channels are the consequences of the physical characteristics of the underlying hardware, such as changes in power consumption [1], timing delays [2], or any other measurable property that changes based on the secret key.