Leakage Power Analysis attacks: Well-defined procedure and first experimental results | IEEE Conference Publication | IEEE Xplore