Marvin Attack: potential key recovery through timing sidechannels
Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key.