I. Introduction
Electronic devices are highly vulnerable to a potent form of physical attacks known as power side-channel attacks [1]. These attacks can reveal secrets by analysing the power con-sumption patterns of a device. While the most common ap-plication of side-channel attacks is to steal secret keys from ciphers, the attacks are finding application beyond cryptogra-phy to discover passwords [2], reverse engineer software [3], [4] and Deep Learning algorithms [5], [6], log keystrokes, and fin-gerprint website activity [7]. Thus, there is a critical need to protect systems against power side-channel attacks.