Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, p.104113, 1996. ,
Jun: Differential Power Analysis, Advances in Cryptology -Crypto 99 Proceedings, 1999. ,
Electromagnetic Analysis: Concrete Results, Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990
Power and electromagnetic analysis: Improved model consequences and comparisons. Integration, the VLSI Journal, Special issue: Embedded cryptographic hardware, pp.52-60, 2007. ,
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, 1965. ,
DOI : 10.1007/3-540-44499-8_5
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration, Cryptographic Hardware and Embedded Systems -CHES 2008, pp.346-362, 2008. ,
DOI : 10.1007/978-3-540-85053-3_22
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware Embedded System--CHES 2004, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Analysis (SPA) attack on implementations of the AES key expansion, Proc. of the ACM-IEEE Design Automation Conference, pp.343358-343373, 2002. ,