P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

D. Agrawal, B. Archambeault, J. Rao, and P. Rohatgi, The EM Side???Channel(s), Cryptographic Hardware and Embedded Systems -CHES 2002, pp.29-45, 2003.
DOI : 10.1007/3-540-36400-5_4

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security), 2007.

C. Clavier, J. S. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, CHES '00: Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, pp.252-263, 2000.
DOI : 10.1007/3-540-44499-8_20

M. Bucci, R. Luzzi, M. Guglielmo, A. Trifiletti, I. Ag et al., A Countermeasure against Differential Power Analysis based on Random Delay Insertion, 2005 IEEE International Symposium on Circuits and Systems, pp.3547-3550, 2005.
DOI : 10.1109/ISCAS.2005.1465395

S. Yang, W. Wolf, N. Vijaykrishnan, D. N. Serpanos, and X. Yuan, Power attack resistant cryptosystem design: a dynamic voltage and frequency switching approach, Design, Automation and Test in Europe, pp.64-69, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00181822

J. Coron and I. Kizhvatov, An Efficient Method for Random Delay Generation in Embedded Software, Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, p.170, 2009.
DOI : 10.1007/978-3-642-04138-9_12

N. Homma, S. Nagashima, T. Sugawara, T. Aoki, and A. Satoh, A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.91, issue.1, pp.91-193, 2008.
DOI : 10.1093/ietfec/e91-a.1.193

S. Nagashima, N. Homma, Y. Imai, T. Aoki, and A. Satoh, DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure, 2007 IEEE International Symposium on Circuits and Systems, pp.1807-1810, 2007.
DOI : 10.1109/ISCAS.2007.378024

C. Gebotys, C. Tiu, and X. Chen, A countermeasure for EM attack of a wireless PDA, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, pp.544-549, 2005.
DOI : 10.1109/ITCC.2005.6

C. H. Gebotys, S. Ho, and C. Tiu, EM analysis of Rijndael and ECC on a wireless Javabased PDA, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.250-264, 2005.

T. Plos, M. Hutter, and M. Feldhofer, Evaluation of side-channel preprocessing techniques on cryptographic-enabled HF and UHF RFID-tag prototypes, Budapest, 2008.

M. Hutter, S. Mangard, and M. Feldhofer, Power and EM attacks on passive RFID devices, Cryptographic Hardware and Embedded Systems ? CHES 2007, pp.320-333, 2007.

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.135-152, 2004.
DOI : 10.1007/978-3-540-28632-5_2

M. Hutter, M. Medwed, D. Hein, and J. Wolkerstorfer, Attacking ECDSA-Enabled RFID Devices, Proceedings of the 7th International Conference on Applied Cryptography and Network Security, p.534, 2009.
DOI : 10.1007/978-3-642-01957-9_32

T. H. Le, J. Cldire, C. Canovas, B. Robisson, C. Servire et al., A Proposition for Correlation Power Analysis Enhancement, pp.174-186, 2006.
DOI : 10.1007/11894063_14

URL : https://hal.archives-ouvertes.fr/hal-00133098

T. H. Le, C. Canovas, and J. Cldire, An overview of side channel analysis attacks, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.33-43, 2008.
DOI : 10.1145/1368310.1368319