S. Bhasin, J. Danger, S. Guilley, and Z. Najm, NICV: normalized inter-class variance for detection of side-channel leakage, IACR Cryptology ePrint Archive, p.717, 2013.

E. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop, pp.16-29, 2004.

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards sound approaches to counteract power-analysis attacks, pp.398-412, 1999.

A. Dehbaoui, V. Lomné, P. Maurine, L. Torres, and M. Robert, Enhancing electromagnetic attacks using spectral coherence based cartography, VLSI-SoC: Technologies for Systems Integration -17th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, pp.135-155, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00429342

P. Fouque and F. Valette, The doubling attack -Why Upwards Is Better than Downwards, Cryptographic Hardware and Embedded Systems -CHES 2003, 5th International Workshop, pp.269-280, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00563965

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual information analysis, Cryptographic Hardware and Embedded Systems -CHES 2008, 10th International Workshop, pp.426-442, 2008.

S. Guilley, H. Maghrebi, Y. Souissi, L. Sauvage, and J. Danger, Quantifying the quality of side channel acquisitions, COSADE, 2011.

I. Diop, P. Liardet, Y. Linge, and M. P. , Collision based attacks in practice, CRYPTO'PUCES, 2015.
URL : https://hal.archives-ouvertes.fr/lirmm-01269809

P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conferences, pp.388-397, 1999.

S. Mangard, Hardware countermeasures against dpa ? a statistical analysis of their effectiveness, CT-RSA, pp.222-235, 2004.

S. Mangard, E. Oswald, and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, vol.31, 2008.

E. Mateos and C. H. Gebotys, A new correlation frequency analysis of the side channel, Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, p.4, 2010.

D. Réal, F. Valette, and M. Drissi, Enhancing correlation electromagnetic attack using planar near-field cartography, Design, Automation and Test in Europe, pp.628-633, 2009.

L. Sauvage, S. Guilley, F. Flament, J. Danger, and Y. Mathieu, Blind cartography for side channel attacks: Cross-correlation cartography, Int. J. Reconfig. Comp, vol.360242, issue.9, pp.1-360242, 2012.

K. Schramm, T. Wollinger, and C. Paar, A new class of collision attacks and its application to DES, Fast Software Encryption, 10th International Workshop, FSE 2003, pp.206-222, 2003.

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009.

S. Tiran, S. Ordas, Y. Teglia, M. Agoyan, and P. Maurine, A model of the leakage in the frequency domain and its application to CPA and DPA, J. Cryptographic Engineering, vol.4, issue.3, pp.197-212, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01096000

S. Yen, W. Lien, S. Moon, and J. Ha, Power analysis by exploiting chosen message and internal collisions -vulnerability of checking mechanism for rsadecryption, Progress in Cryptology -Mycrypt, pp.183-195, 2005.