FortifyIQ provides full mathematical analysis of the method and shows that, under certain assumptions and with a sufficient amount of traces, any key can be revealed. In the experimental part of the paper, FortifyIQ demonstrates a successful application of the attack both in software simulation and on an FPGA board using power consumption measurements.