Visible to the public Simulation‐Based Verification of EM Side‐Channel Attack Resilience of Embedded Cryptographic System