A side-channel method that directly inspects power traces for operation patterns that leak cryptographic secrets.