Computer systems increasingly perform operations on critical and confidential data. Despite best efforts to protect this information, the side effects of computations using this data, e.g., the computation time, the power consumption, electromagnetic radiation, thermal emanations, and acoustics, can be used to decipher secret information even when it is encrypted.