I. Introduction
Side-channel attacks (SCAs) that illegally decipher secret information of cryptographic equipment by exploiting electromagnetic (EM) radiation/emanation are a realistic threat [1]. Although SCA is a powerful cryptanalytic attack, if cryptographic devices are protected by countermeasures, attackers need to expend a lot of effort to execute the attack. However, the countermeasures increase the cost of SCA resistance evaluation because it is necessary to perform a SCA equivalent to one performed by the attacker, and improving the vulnerability by countermeasures can require a larger number of side-channel traces than before improvement, even for evaluation. In the existing SCA resistance evaluation, a number of side-channel traces required for the key decryption are analyzed as evaluation criterion. Key decryption generally requires thousands to hundreds of thousands of traces in SCAs. This means that a huge amount of traces may have to be acquired every time the countermeasure design is changed. In order to avoid this, it is necessary to accurately set the design goals for achieving the required SCA resistance. Setting a signal-to-noise ratio (SNR) as the design goal could lead to efficient countermeasure design and reduction of evaluation cost.