Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Differential Power Analysis, Proc. 19th International Conference on Cryptology (CRYPTO), pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
Electromagnetic Analysis: Concrete Results, Proc. 3rd Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
Investigations of power analysis attacks on smartcards, Proc. of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology (WOST), pp.17-17, 1999. ,
Ways to Enhance Differential Power Analysis, Proc. 5th International Conference on Information Security and Cryptology (ICISC), pp.327-342, 2002. ,
DOI : 10.1007/3-540-36552-4_23
Correlation Power Analysis with a Leakage Model, Proc. 7th Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
An overview of side channel analysis attacks, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.33-43, 2008. ,
DOI : 10.1145/1368310.1368319
Mutual Information Analysis, Proc. of the 10th international workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Differential Power Analysis in the Presence of Hardware Countermeasures, Proc. of the Second International Workshop on Cryptographic Hardware and Embedded Systems (CHES), pp.252-263, 2000. ,
DOI : 10.1007/3-540-44499-8_20
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Proc. of the 28th Annual International Conference on Advances in Cryptology (EUROCRYPT), pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26