I. Introduction
Cryptographic functions are usually integrated into critical electronic systems including credit cards, automotive electronics, medical devices, and even high-end weapons to protect confidential information and personal privacy from leaking. These cryptographic functions are secure from the perspective of mathematical theory and computational complexity. For example, RSA is secure because of the difficulty of the factorization of large prime numbers, and ECC security is based on the intractability of the elliptic curve discrete logarithm problem. However, computer scientists discovered a new way to recover the private key from the perspective of side effects of power consumption, timing, and electromagnetic radiation when the cryptographic function executes. Attackers can effectively extract secret information such as keys from electronic devices through technologies such as statistical analysis and machine learning.