P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Proc. 19th International Conference on Cryptology (CRYPTO), pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, Proc. 3rd Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

T. Messerges, E. Dabbish, and R. Sloan, Investigations of power analysis attacks on smartcards, Proc. of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology (WOST), pp.17-17, 1999.

R. Bevan and E. Knudsen, Ways to Enhance Differential Power Analysis, Proc. 5th International Conference on Information Security and Cryptology (ICISC), pp.327-342, 2002.
DOI : 10.1007/3-540-36552-4_23

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Proc. 7th Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

T. Le, C. Canovas, and J. Clédì-ere, An overview of side channel analysis attacks, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.33-43, 2008.
DOI : 10.1145/1368310.1368319

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual Information Analysis, Proc. of the 10th international workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.426-442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

C. Clavier, J. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, Proc. of the Second International Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.252-263, 2000.
DOI : 10.1007/3-540-44499-8_20

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Proc. of the 28th Annual International Conference on Advances in Cryptology (EUROCRYPT), pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26