[1]https://thehackernews.com/2022/03/researchers-demonstrate-new-side.html "A group of academics from the North Carolina State University and Dokuz Eylul University have demonstrated what they say is the "first side-channel attack" on homomorphic encryption that could be exploited to leak data as the encryption process is underway." "Basically, by monitoring power consumption in a device that is encoding data for homomorphic encryption, we are able to read the data as it is being encrypted," Aydin Aysu, one of the authors of the study, [2]said. "This demonstrates that even next generation encryption technologies need protection against side-channel attacks." "Homomorphic Encryption is a [3]form of encryption that allows certain types of computation to be performed directly on encrypted data without having to decrypt it in the first place." References 1. https://thehackernews.com/2022/03/researchers-demonstrate-new-side.html 2. https://news.ncsu.edu/2022/03/stealing-homomorphic-encryption-data/ 3. https://en.wikipedia.org/wiki/Homomorphic_encryption