Abstract
When we started writing this book, we thought that the final manuscript would have about 200 pages. However, after having finished the first couple of chapters, we realized that the final manuscript would get significantly longer. Power analysis attacks are a very interdisciplinary topic. Hence, these attacks have attracted the attention of people with very different backgrounds. This has lead to a large number and a great variety of publications that discuss power analysis attacks from many different points of view.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Conclusions. In: Power Analysis Attacks. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-38162-6_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-38162-6_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30857-9
Online ISBN: 978-0-387-38162-6
eBook Packages: Computer ScienceComputer Science (R0)
