Skip to main content

General Conclusion and Possible Further Directions

  • Chapter
  • First Online:
Advanced DPA Theory and Practice
  • 1278 Accesses

Abstract

Alice and Bob, our two heroes, realized that there may be more backdoors than they expected. And when designing a secure system, they certainly cannot ignore them. Principally, our purpose was not to propose new physical leakages of embedded systems, but rather we intended to provide a thorough survey of two of them, namely the power and the electromagnetic emanations. In this respect, we investigated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Messerges, T. S. (2000). Using second-order power analysis to attack DPA resistant software. In Ç. K. Koç & C. Paar (Eds.), CHES, volume 1965 of Lecture Notes in Computer Science (pp. 238–251). Berlin: Springer.

    Google Scholar 

  2. Standaert, F.-X., Malkin, T. G., & Yung, M. (2006). A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks. IACR e-print archive 2006/134.

    Google Scholar 

  3. Tuyls, P., Schrijen, G. J., Skoric, B., van Geloven, J., Verhaegh, N., & Wolters, R. (2006). Read-proof hardware from protective coatings. In L. Goubin & M. Matsui (Eds.), CHES, volume 4269 of Lecture Notes in Computer Science (pp. 369–383). Berlin: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Peeters .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Peeters, E. (2013). General Conclusion and Possible Further Directions. In: Advanced DPA Theory and Practice. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6783-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6783-0_9

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6782-3

  • Online ISBN: 978-1-4614-6783-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics