P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, CRYPTO, pp.388-397, 1999.

E. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, CHES, pp.16-29, 2004.

D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, The em sidechannel(s), CHES, pp.29-45, 2002.

A. Dehbaoui, V. Lomné, P. Maurine, L. Torres, and M. Robert, Enhancing electromagnetic attacks using spectral coherence based cartography, VLSI-SoC, pp.135-155, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00429342

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic analysis: Concrete results, CHES, pp.251-261, 2001.

D. Réal, F. Valette, and M. Drissi, Enhancing correlation electromagnetic attack using planar near-field cartography, DATE, pp.628-633, 2009.

L. Sauvage, S. Guilley, and Y. Mathieu, Electromagnetic radiations of fpgas: High spatial resolution cartography and attack on a cryptographic module, TRETS, vol.2, issue.1, 2009.

W. Diffie and M. Hellman, New directions in cryptography. Information Theory, IEEE Transactions on, vol.22, pp.644-654, 1976.

L. R. Adleman, A. Rivest, and . Shamir, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol.21, pp.120-126, 1978.

G. Perin, D. G. Mesquita, and J. B. Martins, Montgomery modular multiplication on reconfigurable hardware: Systolic versus multiplexed implementation, In International Journal of Reconfigurable Computing, vol.2011, 2011.

T. Kasper, D. Oswald, and C. Paar, Em side-channel attacks on commercial contactless smartcards using low-cost equipment, WISA, pp.79-93, 2009.

O. Meynard, D. Réal, F. Flament, S. Guilley, N. Homma et al., Enhancement of simple electro-magnetic attacks by precharacterization in frequency domain and demodulation techniques, DATE, pp.1004-1009, 2011.

P. L. Montgomery, Modular Multiplication Without Trial Division. Mathematics of Computation, vol.44, pp.519-521, 1985.

A. J. Menezes, P. C. Van-oorschot, and S. A. Vanstone, The Handbook of Applied Cryptography, 1997.

J. Coron, Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. CHES, pp.292-302, 1999.

M. Joye, S. , and M. Yen, The Montgomery Powering Ladder. CHES, pp.291-302, 2002.