Power estimation starategies for a low-power security processor