“…DPA attacks had been very successful in challenging the security of private key cryptosystems like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and so on [3–6] and public key cryptosystems like Rivest‐Shamir‐Adleman (RSA), Diffie Hellman, Elliptic Curve Cryptography (ECC) [7–13]. Correlation power analysis (CPA), which was an extension to DPA, used techniques like Pearson's correlation analysis, mutual information analysis and so on after conventional DPA steps to provide more efficient results even with fewer number of power traces [14–17]. CPA had significantly contributed in power analysis research.…”