Attacks using errors injected at runtime into an implementation of cryptographic algorithms to cause misbehavior that leak information about keys or (plaintext) data, instead of (or additional to) using cryptographic weaknesses. The countermeasures against such attacks also belong here.
Examples include glitching the vcore of a CPU, using electromagnetic glitches, or lasers targeting specific transistors while an implementation performs cryptographic operations.