The document discusses power analysis attacks and countermeasures. It describes simple power analysis (SPA) attacks which visually inspect power traces to obtain secrets. Differential power analysis (DPA) is a more powerful statistical technique that analyzes correlation between power traces and cryptographic operations. There are six stages to a DPA attack: setup, measurement, signal processing, selection function generation, averaging, and evaluation. Variants include correlation power analysis, probability distribution analysis, and high-order DPA. Countermeasures aim to reduce information leakage, add randomness, or use masking and protocol-level techniques.