A. Bogdanov, I. Kizhvatov, and A. Pyshkin, Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection, INDOCRYPT, pp.251-265, 2008.
DOI : 10.1007/978-3-540-77360-3_6

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, pp.16-29
DOI : 10.1007/978-3-540-28632-5_2

C. Carlet, J. Faugère, and C. Goyet, Analysis of the algebraic side channel attack, Journal of Cryptographic Engineering, vol.24, issue.1, pp.45-62, 2012.
DOI : 10.1007/s13389-012-0028-0

URL : https://hal.archives-ouvertes.fr/hal-00777829

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

F. Durvaux, M. Renauld, and F. Standaert, Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models, Lecture Notes in Computer Science, vol.7771, pp.123-140, 2012.
DOI : 10.1007/978-3-642-37288-9_9

T. Eisenbarth, C. Paar, and B. Weghenkel, Building a Side Channel Based Disassembler, Transactions on Computational Science, vol.10, pp.78-99, 2010.
DOI : 10.1007/978-3-642-17499-5_4

R. G. Gallager, Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, pp.21-28, 1962.
DOI : 10.1109/TIT.1962.1057683

B. Gérard and F. Standaert, Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting, Prouff and Schaumont, pp.175-192
DOI : 10.1007/978-3-642-33027-8_11

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual Information Analysis, CHES, pp.426-442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

S. Guo, X. Zhao, F. Zhang, T. Wang, Z. J. Shi et al., Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations, IEEE Transactions on Information Forensics and Security, vol.9, issue.6, pp.999-1014, 2014.
DOI : 10.1109/TIFS.2014.2315534

C. Karlof and D. Wagner, Hidden Markov Model Cryptanalysis, CHES, pp.17-34, 2003.
DOI : 10.1007/978-3-540-45238-6_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.5945

C. Paul, J. Kocher, and B. Jaffe, Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999.

J. C. David and . Mackay, Information theory, inference, and learning algorithms, 2003.

S. Mangard, A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, Lecture Notes in Computer Science, vol.2587, pp.343-358, 2002.
DOI : 10.1007/3-540-36552-4_24

S. Mangard, E. Oswald, and F. Standaert, One for all ??? all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, issue.2, pp.100-110, 2011.
DOI : 10.1049/iet-ifs.2010.0096

M. Saied, E. Mohamed, S. Bulygin, M. Zohner, A. Heuser et al., Improved algebraic side-channel attack on AES, Journal of Cryptographic Engineering, vol.3, issue.3, pp.139-156, 2013.

Y. Oren, M. Kirschbaum, T. Popp, and A. Wool, Algebraic Side-Channel Analysis in the Presence of Errors, CHES, pp.428-442, 2010.
DOI : 10.1007/978-3-642-15031-9_29

Y. Oren, M. Renauld, F. Standaert, and A. Wool, Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model, Prouff and Schaumont, pp.140-154
DOI : 10.1007/978-3-642-33027-8_9

M. Renauld and F. Standaert, Algebraic Side-Channel Attacks, Information Security and Cryptology -5th International Conference, pp.393-410, 2009.
DOI : 10.1007/978-3-642-16342-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.8043

F. Mathieu-renauld, N. Standaert, and . Veyrat-charvillon, Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA, CHES, pp.97-111, 2009.
DOI : 10.1007/978-3-642-04138-9_8

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, CHES, pp.30-46, 2005.
DOI : 10.1007/11545262_3

K. Schramm, G. Leander, P. Felke, and C. Paar, A Collision-Attack on AES, Joye and Quisquater [11], pp.163-175
DOI : 10.1007/978-3-540-28632-5_12

K. Schramm, T. J. Wollinger, and C. Paar, A New Class of Collision Attacks and Its Application to DES, Lecture Notes in Computer Science, vol.2887, pp.206-222, 2003.
DOI : 10.1007/978-3-540-39887-5_16

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Lecture Notes in Computer Science, vol.28, issue.2, pp.443-461
DOI : 10.1007/978-3-540-85053-3_26

N. Veyrat-charvillon, B. Gérard, M. Renauld, and F. Standaert, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography, pp.390-406, 2012.
DOI : 10.1007/978-3-642-35999-6_25

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Security Evaluations beyond Computing Power, Lecture Notes in Computer Science, vol.7881, pp.126-141, 2013.
DOI : 10.1007/978-3-642-38348-9_8

URL : http://hdl.handle.net/2078.1/133720

F. Zhang, X. Zhao, S. Guo, T. Wang, and Z. Shi, Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers, Lecture Notes in Computer Science, vol.7864, pp.62-79, 2013.
DOI : 10.1007/978-3-642-40026-1_5