[rwth-security] Soatok’s Guide to Side-Channel Attacks