1. CHAPTER - 1 1.1 INTRODUCTION Power analysis attacks have attracted significant attention within thecryptographic community. So far, they have been successfully applied…