Researchers have developed an algorithm that safeguards hardware from attacks designed to steal data. In the attacks, hackers detect variations of power and electromagnetic radiation in an electronic device’s hardware and use the variation to steal encrypted information.