Enhancing Power Analysis Attacks against Cryptographic Devices