In the context of the security assessment of electronic devices, evaluatorscan perform attacks on cryptographic algorithm implemented in securecryptoprocessor. In our case, we are interested in side-channel attacks whichuse electrical consumption or electromagnetic signals from the device torecover sensitive information such as cryptographic keys. The leakage model,which depends on the software and on the device, is generally not accessibleand difficult to compute. Moreover, the evaluators also have to take intoaccount the various conditions in which the attacks could in theory beperformed and look for the best attack to anticipate attackers. Last but notleast, the manufacturers can add countermeasures which will have an impacteither on the...