ANALYZING AES POWER TRACES FOR SIDE-CHANNEL ATTACK: GENERATION, CLASSIFICATION, KEY DEDUCTION, AND MITIGATION STRATEGIES