“…In this section, we discuss masking schemes, verification approaches, mitigation techniques and measurement of information leakage related to power side-channel attacks. Work on other side-channel attacks that rely on execution-time [3], [68], [69], [70], [71], [72], [73], [74], [75], [76], faults [52], [77], [78], [79], and cache [80], [81], [82], [83], [84], [85], [86], [87], [88], [89] do exist, but is orthogonal to ours, hence will not be discussed in this section.…”