16.4. Attacks and Pitfalls: Side-channel Leakage