Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack | IEEE Conference Publication | IEEE Xplore