This is a specific type of power analysis that uses statistical techniques to extract cryptographic keys from a device.