General Introduction.- Side-Channel Cryptanalysis: a brief survey.- CMOS devices: sources and models of emanation.- Measurement of the power consumption.- Electromagnetic Leakage.- Statistical Tools.- Higher Order Attacks.- Towards the Evaluation of an Implementation against Side-Channel Attacks.- General Conclusion and Possible Further Directions.