“…There have been several attacks that exploit weaknesses in caches [5,8,19,21,48,49,50,51,51,52] and branch prediction [6,7,9]. Some countermeasures against these threats include self-destructing keys [32,35,62,72] and new circuit styles that consume the same operational power irrespective of input values [27,38,58,64,65] and microarchitectural techniques [11,22,63,66,69].…”