B. [. Amiel, K. Feix, and . Villegas, Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms, Selected Areas in Cryptography, pp.110-125, 2007.
DOI : 10.1007/978-3-540-77360-3_8

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

B. Chevallier-mames, M. Ciet, and M. Joye, Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity, IEEE Transactions on Computers, vol.53, issue.6, pp.760-768, 2004.
DOI : 10.1109/TC.2004.13

J. Coron and M. E. Hellman, Resistance against differential power analysis for elliptic curve cryptosystems New Directions in cryptography, Cryptographic Hardware and Embedded Systems -CHES 1999, pp.292-302, 1976.

J. Dhem, Design of an efficient public-key cryptographic library for RISCbased smart cards Fouque and F. Valette. The Doubling Attack -why upwards is better than downwards, Cryptographic Hardware and Embedded Systems -CHES 2003, volume 2779 of Lecture Notes in Computer Science, pp.269-280, 1998.

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual Information Analysis, Cryptographic Hardware and Embedded Systems CHES 2008, pp.426-442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

C. ¸. Koç, T. Acar, B. C. Kaliski-[-kjj99-]-p, J. Kocher, B. Jaffe et al., Analysing and comparing Montgomery multiplication algorithms Differential Power Analysis, Advances in Cryptology -CRYPTO '99, volume 1666 of Lecture Notes in Computer ScienceKoc96] P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems Advances in Cryptology -CRYPTO '96, pp.26-33, 1996.

P. L. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X

A. Menezes, P. C. Van-oorschot, S. A. Vanstone, M. Prouff, and . Rivain, Handbook of Applied Cryptography Theoretical and practical aspects of mutual information based side channel analysis, Applied Cryptography and Network Security, pp.499-518, 1996.

R. L. Rivest, L. Shamir, and . Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

F. Standaert, B. Gierlichs, and I. Verbauwhede, Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, Lecture Notes in Computer Science Lecture Notes in Computer Science, vol.51, issue.5, pp.253-267, 2005.
DOI : 10.1007/11802839_42