Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

“Even when a cryptographic scheme is mathematically secure and sound, its implementations may

be vulnerable to side-channel attacks that exploit physical emanations. Such emanations can leak

information about secret values inside the computation, directly or indirectly, and have been exploited

by attacks on many cryptographic implementations.”