ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks