This technique aims to recognize specific cryptographic operations by looking for specific traces in measurements.