“…The above observations signified that our proposed method to compute modular exponentiation could provide resistance to all sort of power analysis attacks especially CPA. If we compared our work with the previous works in [24, 25] we could see that, in [24] the exponent was partitioned only into two parts and similarly in [25] there were 16 partitions every time. However, in our proposed work, we could generate any number of partitions between 8 and 32.…”