. "These attacks would be likely combined with some sort of physical tampering such as power analysis and fault injection." . . .