P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings. Volume 1666 of Lecture Notes in Computer Science, pp.388-397, 1999.

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Investigations of Power Analysis Attacks on Smartcards, USENIX Workshop on Smartcard Technology (Smartcard '99, pp.151-162, 1999.

¨. Ors, S. B. Oswald, E. Preneel, and B. , Power-Analysis Attacks on FPGAs ? First Experimental Results, Cryptographic Hardware and Embedded Systems ? CHES 2003, 5th International Workshop Proceedings. Volume 2779 of Lecture Notes in Computer Science, pp.35-50, 2003.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks ? Revealing the Secrets of Smart Cards, 2007.

D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, The EM Side???Channel(s), Cryptographic Hardware and Embedded Systems ? CHES 2002, 4th International Workshop, pp.29-45, 2002.
DOI : 10.1007/3-540-36400-5_4

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems ? CHES 2001, Third International Workshop Proceedings. Volume 2162 of Lecture Notes in Computer Science, pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

K. Tiri, M. Akmal, and I. Verbauwhede, A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards In: 28th European Solid-State Circuits Conference -ESS- CIRC, Proceedings, IEEE, pp.403-406, 2002.

K. Tiri and I. Verbauwhede, A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation, Proceedings Design, Automation and Test in Europe Conference and Exhibition, pp.16-20, 2004.
DOI : 10.1109/DATE.2004.1268856

T. Popp and S. Mangard, Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints, Cryptographic Hardware and Embedded Systems ? CHES 2005, 7th International Workshop Proceedings. Volume 3659 of Lecture Notes in Computer Science, pp.172-186, 2005.
DOI : 10.1007/11545262_13

J. S. Coron, P. C. Kocher, and D. Naccache, Statistics and Secret Leakage, 4th International Conference, FC 2000 Anguilla, British West Indies, pp.157-173, 1962.

A. Shamir, Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Cryptographic Hardware and Embedded Systems ? CHES 2000, Second International Workshop Proceedings. Volume 1965 of Lecture Notes in Computer Science, pp.71-77, 2000.
DOI : 10.1007/3-540-44499-8_5

P. Corsonello, S. Perri, and M. Margala, A New Charge-Pump Based Countermeasure Against Differential Power Analysis, Proceedings of the 6th International Conference on ASIC, pp.66-69, 2005.

Y. Oren and A. Shamir, How not to protect pcs from power analysis. Rump Session, 2006.

T. Plos, Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags, Proceedings. Lecture Notes in Computer Science, vol.56, issue.9, pp.444-458, 2009.
DOI : 10.1007/11605805_8

N. H. Weste and K. Eshraghian, Principles of CMOS VLSI Design -A Systems Perspective, 1993.

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings. Volume 3156 of Lecture Notes in Computer Science, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

¨. Ors, S. B. Gürkaynak, F. K. Oswald, E. Preneel, and B. , Power-analysis attack on an ASIC AES implementation, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., pp.546-552, 2004.
DOI : 10.1109/ITCC.2004.1286711

K. Schramm, G. Leander, P. Felke, and C. Paar, A Collision-Attack on AES, Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings. Volume 3156 of Lecture Notes in Computer Science, pp.163-175, 2004.
DOI : 10.1007/978-3-540-28632-5_12

S. Mangard, M. Aigner, and S. Dominikus, A highly regular and scalable aes hardware architecture, IEEE Transactions on Computers, vol.52, issue.4, pp.483-491, 2003.
DOI : 10.1109/TC.2003.1190589

J. Wolkerstorfer, E. Oswald, and M. Lamberger, An ASIC implementation of the AES SBoxes Topics in Cryptology -CT-RSA 2002, The Cryptographers' Track at the RSA Conference, Proceedings. Volume 2271 of Lecture Notes in Computer Science, pp.67-78, 2002.