Power estimation strategies for a low-power security processor | IEEE Conference Publication | IEEE Xplore