l/index.html, introduced into the present application as a reference) is based on the observation that, in reality, an attacker can acquire information other than just the input and output data during the execution of the calculation such as, for example, the electric power consumption of the microcontroller or the electromagnetic radiation emitted by the circuit.