S. Joël-alwen, K. Krenn, D. Pietrzak, and . Wichs, Learning with Rounding, Revisited, Lecture Notes in Computer Science, vol.8042, issue.1, pp.57-74, 2013.
DOI : 10.1007/978-3-642-40041-4_4

A. Banerjee, C. Peikert, and A. Rosen, Pseudorandom Functions and Lattices, Lecture Notes in Computer Science, vol.7237, pp.719-737, 2012.
DOI : 10.1007/978-3-642-29011-4_42

J. Daniel, T. Bernstein, and . Lange, Never Trust a Bunny, RFIDSec, pp.137-148, 2012.

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, pp.16-29
DOI : 10.1007/978-3-540-28632-5_2

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Lecture Notes in Computer Science, vol.1666, pp.398-412, 1999.
DOI : 10.1007/3-540-48405-1_26

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

L. Goubin and J. Patarin, DES and Differential Power Analysis The ???Duplication??? Method, CHES, pp.158-172, 1999.
DOI : 10.1007/3-540-48059-5_15

V. Grosso, F. Standaert, and S. Faust, Masking vs. Multiparty Computation: How Large Is the Gap for AES?, CHES, pp.400-416, 2013.
DOI : 10.1007/978-3-642-40349-1_23

S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, and K. Pietrzak, Lapin: An Efficient Authentication Protocol Based on Ring-LPN, Lecture Notes in Computer Science, vol.7549, pp.346-365, 2012.
DOI : 10.1007/978-3-642-34047-5_20

URL : https://hal.archives-ouvertes.fr/hal-00864307

S. Mangard, Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, Lecture Notes in Computer Science, vol.2964, pp.222-235, 2004.
DOI : 10.1007/978-3-540-24660-2_18

S. Mangard, E. Oswald, and T. Popp, Power analysis attacks revealing the secrets of smart cards, 2007.

S. Mangard, T. Popp, M. Berndt, and . Gammel, Side-Channel Leakage of Masked CMOS Gates, Lecture Notes in Computer Science, vol.3376, pp.351-365, 2005.
DOI : 10.1007/978-3-540-30574-3_24

S. Mangard, N. Pramstaller, and E. Oswald, Successfully Attacking Masked AES Hardware Implementations, CHES, pp.157-171, 2005.
DOI : 10.1007/11545262_12

M. Medwed and F. Standaert, Extractors against side-channel attacks: weak or strong?, Journal of Cryptographic Engineering, vol.58, issue.6, pp.231-241, 2011.
DOI : 10.1007/s13389-011-0014-y

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, CHES, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

K. Schramm, G. Leander, P. Felke, and C. Paar, A Collision-Attack on AES, Joye and Quisquater [10], pp.163-175
DOI : 10.1007/978-3-540-28632-5_12

F. Standaert, N. Veyrat-charvillon, E. Oswald, B. Gierlichs, M. Medwed et al., The World Is Not Enough: Another Look on Second-Order DPA, Lecture Notes in Computer Science, vol.6477, pp.112-129, 2010.
DOI : 10.1007/978-3-642-17373-8_7

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Security Evaluations beyond Computing Power, Lecture Notes in Computer Science, vol.7881, pp.126-141, 2013.
DOI : 10.1007/978-3-642-38348-9_8