“…Many countermeasures, including masking [13][14][15], shuffling [16][17][18], randomized clock [19,20], random delay insertion [21][22][23], constant-weight encoding [24], and code polymorphism [25,26], are used to lessen side-channel assaults. By preventing information from leaking through physically quantifiable channels like time [27,28], power consump-tion [29,30], or electromagnetic radiation [31,32], these countermeasures seek to safeguard cryptographic systems.…”