Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

“Even when a cryptographic scheme is mathematically secure and sound, its implementations may
be vulnerable to side-channel attacks that exploit physical emanations. Such emanations can leak
information about secret values inside the computation, directly or indirectly, and have been exploited
by attacks on many cryptographic implementations.”