G. Bertoni, L. Breveglieri, P. Fragneto, M. Macchetti, and S. Marchesin, Efficient Software Implementation of AES on 32-Bit Platforms, Cryptographic Hardware and Embedded Systems (ches), pp.159-171, 2002.
DOI : 10.1007/3-540-36400-5_13

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

C. Clavier, J. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, Cryptographic Hardware and Embedded Systems (ches), pp.252-263, 1965.
DOI : 10.1007/3-540-44499-8_20

C. Collberg and C. Thomborson, Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002.
DOI : 10.1109/TSE.2002.1027797

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.6168

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.
DOI : 10.1007/978-3-662-04722-4

C. Gentry, S. Halevi, and V. Vaikuntanathan, i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits Advances in Cryptology crypto 2010, pp.155-172, 2010.
DOI : 10.1007/978-3-642-14623-7_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.470.281

C. Herbst, E. Oswald, and S. Mangard, An AES Smart Card Implementation Resistant to Power Analysis Attacks, Applied Cryptography and Network Security (accs), pp.239-252, 2006.
DOI : 10.1007/11767480_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.179

D. Knuth, The Art of Computer Programming, Seminumerical Algorithms, vol.2, 1998.

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis Advances in Cryptology crypto 1999, pp.388-397, 1999.

P. Leadbitter, D. Page, and N. Smart, Nondeterministic Multithreading, IEEE Transactions on Computers, vol.56, issue.7, pp.992-998, 2007.
DOI : 10.1109/TC.2007.1049

J. Merrill, generic and gimple: A new tree representation for entire functions, 2003.

M. Tunstall and O. Beno??tbeno??t, Efficient Use of Random Delays in Embedded Software, Information Security Theory and Practices (wistp), pp.27-38, 2007.

Z. Xin, H. Chen, H. Han, B. Mao, and L. Xie, Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation, isc 2010, Information Security, pp.181-195, 2011.
DOI : 10.1007/978-3-642-18178-8_16