H. Akaike, Information theory and an extension of the Maximum Likelihood Principle, Second International Symposium on Information Theory, 1973.

S. Aumonier, Generalized Correlation Power Analysis, ECRYPT Workshop on Tools For Cryptanalysis, 2007.

O. Barndorff-nielsen, Exponentially Decreasing Distributions for the Logarithm of Particle Size, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.353, issue.1674, pp.401-419, 1977.
DOI : 10.1098/rspa.1977.0041

L. Batina, B. Gierlichs, and K. Lemke-rust, Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems, pp.112-127, 2009.
DOI : 10.1007/978-3-642-04138-9_9

L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F. Standaert et al., Mutual Information Analysis: a??Comprehensive Study, Journal of Cryptology, vol.4, issue.3, pp.269-291, 2011.
DOI : 10.1007/s00145-010-9084-8

P. Belgarric, N. Bruneau, J. Danger, N. Debande, S. Guilley et al., Time-Frequency Analysis for Second-Order Attacks, CARDIS, 2013.

R. Bevan and E. Knudsen, Ways to Enhance Differential Power Analysis, Information Security and Cryptology (ICISC), pp.327-342, 2002.
DOI : 10.1007/3-540-36552-4_23

S. Bhasin, C. Carlet, and S. Guilley, Theory of Masking with Codewords in Hardware: Low-Weight dth-order Correlation-Immune Boolean Functions, IACR Cryptology ePrint Archive, p.303, 2013.

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, Side-channel leakage and trace compression using normalized inter-class variance, Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP '14, pp.1-7, 2014.
DOI : 10.1145/2611765.2611772

B. Bilgin, B. Gierlichs, S. Nikova, V. Nikov, and V. Rijmen, Higher-Order Threshold Implementations, ASIACRYPT 2014, pp.326-343, 2014.
DOI : 10.1007/978-3-662-45608-8_18

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

M. Carbone, S. Tiran, S. Ordas, M. Agoyan, Y. Teglia et al., On Adaptive Bandwidth Selection for Efficient MIA, In COSADE, 2014.
DOI : 10.1007/978-3-319-10175-0_7

URL : https://hal.archives-ouvertes.fr/lirmm-01096033

J. Coron, E. Prouff, and M. Rivain, Side Channel Cryptanalysis of a Higher Order Masking Scheme, Cryptographic Hardware and Embedded Systems, pp.28-44, 2007.
DOI : 10.1007/978-3-540-74735-2_3

J. Doget, E. Prouff, M. Rivain, and F. Standaert, Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.34, issue.9, pp.123-144, 2011.
DOI : 10.1007/s13389-011-0010-2

D. Freedman and P. Diaconis, On the histogram as a density estimator:L2 theory. Probability Theory and Related Fields, pp.453-476, 1981.

B. Gierlichs, L. Batina, and P. Tuyls, Mutual Information Analysis, Cryptographic Hardware and Embedded Systems, pp.426-442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, volume 1666 of CRYPTO '99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

T. Le and M. Berthier, Mutual Information Analysis under the View of Higher-Order Statistics, IWSEC, pp.285-300, 2010.
DOI : 10.1007/978-3-642-16825-3_19

Y. Linge, C. Dumas, and S. Lambert-lacroix, Maximal Information Coefficient Analysis, Cryptology ePrint Archive, 2014.

V. Lomné, E. Prouff, and T. Roche, Behind the Scene of Side Channel Attacks, ASIACRYPT, volume Kazue Sako and Palash Sarkar of LNCS, pp.506-525, 2013.
DOI : 10.1007/978-3-642-42033-7_26

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

T. S. Messerges, Power Analysis Attacks and Countermeasures for Cryptographic Algorithms, 2000.

T. S. Messerges, E. A. Dabbish, R. H. Sloan, T. S. Messerges, E. A. Dabbish et al., Investigations of Power Analysis Attacks on Smartcards, USENIX Workshop on Smartcard Technology, pp.151-162, 1999.

A. Moradi, S. Guilley, and A. Heuser, Detecting Hidden Leakages, ACNS, pp.324-342, 2014.
DOI : 10.1007/978-3-319-07536-5_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.2366

A. Moradi, A. Poschmann, S. Ling, C. Paar, and H. Wang, Pushing the Limits: A Very Compact and a Threshold Implementation of AES, Lecture Notes in Computer Science, vol.6632, pp.69-88, 2011.
DOI : 10.1007/978-3-642-20465-4_6

A. Moradi and A. Wild, Assessment of Hiding the Higher- Order Leakages in Hardware -What Are the Achievements Versus Overheads?, Cryptographic Hardware and Embedded Systems, pp.453-474, 2015.

M. Nassar, Y. Souissi, S. Guilley, and J. Danger, RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp.1173-1178, 2012.
DOI : 10.1109/DATE.2012.6176671

URL : https://hal.archives-ouvertes.fr/hal-00666337

D. Oswald and C. Paar, Improving Side-Channel Analysis with Optimal Linear Transforms, Proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS'12, pp.219-233, 2013.
DOI : 10.1007/978-3-642-37288-9_15

E. Prouff and R. P. Mcevoy, First-Order Side-Channel Attacks on the Permutation Tables Countermeasure -Extended Version -. IACR Cryptology ePrint Archive, p.385, 2010.

E. Prouff and M. Rivain, Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis, ACNS 2009, pp.499-518, 2009.

E. Prouff and M. Rivain, Theoretical and practical aspects of mutual information-based side channel analysis, International Journal of Applied Cryptography, vol.2, issue.2, pp.121-138, 2010.
DOI : 10.1504/IJACT.2010.038306

O. Reparaz, B. Gierlichs, and I. Verbauwhede, Generic DPA attacks: curse or blessing? In Lecture Notes in Computer Science, 2014.

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, Cryptographic Hardware and Embedded Systems, pp.30-46, 2005.
DOI : 10.1007/11545262_3

T. Schneider and A. Moradi, Leakage Assessment Methodology -A Clear Roadmap for Side-Channel Evaluations, Cryptographic Hardware and Embedded Systems, pp.495-513, 2015.

T. Schneider, A. Moradi, and T. Güneysu, Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order, IACR Cryptology ePrint Archive, vol.58, issue.6, p.571, 2015.
DOI : 10.1007/978-3-319-43283-0_12

K. Schramm and C. Paar, Higher Order Masking of the AES, Lecture Notes in Computer Science, vol.3860, 2006.
DOI : 10.1007/11605805_14

D. W. Scott, On optimal and data-based histograms, Biometrika, pp.605-610, 1979.
DOI : 10.1093/biomet/66.3.605

D. W. Scott, Multivariate Density Estimation: Theory, Practice and Visualization, 1992.
DOI : 10.1002/9781118575574

B. Silverman, Density Estimation for Statistics and Data Analysis, p.48, 1998.
DOI : 10.1007/978-1-4899-3324-9

F. Standaert, B. Gierlichs, and I. Verbauwhede, Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, Information Security and Cryptology, pp.253-267, 2008.
DOI : 10.1007/11802839_42

F. Standaert, T. G. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Proceedings of the 28th Annual International Conference on Advances in Cryptology: The Theory and Applications of Cryptographic Techniques, EU- ROCRYPT '09, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

F. Standaert and N. Veyrat-charvillon, Mutual Information Analysis: How, When and Why, Cryptographic Hardware and Embedded Systems, pp.429-443, 2009.

S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, and P. Maurine, A model of the leakage in the frequency domain and its application to CPA and DPA, Journal of Cryptographic Engineering, vol.51, issue.5, pp.197-212, 2014.
DOI : 10.1007/s13389-014-0074-x

URL : https://hal.archives-ouvertes.fr/lirmm-01096000

A. Venelli, Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines, WISTP, pp.17-30, 2010.
DOI : 10.1103/PhysRevE.69.066138

URL : https://hal.archives-ouvertes.fr/hal-01056070

N. Veyrat-charvillon and F. Standaert, Generic sidechannel distinguishers: Improvements and limitations, CRYPTO 2011, pp.354-372
DOI : 10.1007/978-3-642-22792-9_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.5137

C. Whitnall and E. Oswald, A fair evaluation framework for comparing side-channel distinguishers, Journal of Cryptographic Engineering, vol.7, issue.2, pp.145-160, 2011.
DOI : 10.1007/s13389-011-0011-1

C. Whitnall, E. Oswald, and F. Standaert, The Myth of Generic DPA???and the Magic of Learning, CT-RSA, pp.183-205, 2014.
DOI : 10.1007/978-3-319-04852-9_10

X. Ye and T. Eisenbarth, On the Vulnerability of Low Entropy Masking Schemes, CARDIS, pp.44-60, 2013.