D. Aboulkassimi, M. Agoyan, L. Freund, J. Fournier, B. Robisson et al., ElectroMagnetic analysis (EMA) of software AES on Java mobile phones, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011.
DOI : 10.1109/WIFS.2011.6123131

URL : https://hal.archives-ouvertes.fr/emse-00651026

A. Bauer, ´. E. Jaulmes, E. Prouff, and J. Wild, Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations, LNCS, vol.7779, pp.1-17, 2013.
DOI : 10.1007/978-3-642-36095-4_1

A. Bauer, E. Prouff, ´. E. Jaulmes, and J. Wild, Horizontal Collision Correlation Attack on Elliptic Curves, LNCS, vol.8282, 2014.
DOI : 10.1007/s12095-014-0111-8

D. Boneh, G. Durfee, and Y. Frankel, An Attack on RSA Given a Small Fraction of the Private Key Bits, LNCS, vol.1514, pp.25-34, 1998.
DOI : 10.1007/3-540-49649-1_3

B. Castle, Bouncy Castle Crypto APIs

X. Charvet and H. Pelletier, Improving the DPA Attack using Wavelet Transform. Physical Security Testing Workshop available at http://csrc.nist.gov/groups, pp.140-143

C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, and V. Verneuil, Horizontal correlation analysis on exponentiation. IACR Cryptology ePrint Archive, 2010.
DOI : 10.1007/978-3-642-17650-0_5

URL : https://hal.archives-ouvertes.fr/inria-00540384

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, CHES, pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. H. Gebotys, S. Ho, and C. C. Tiu, EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, CHES, pp.250-264, 2005.
DOI : 10.1007/11545262_19

D. Genkin, A. Shamir, and E. Tromer, RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Cryptology ePrint Archive, vol.857, 2013.
DOI : 10.1007/978-3-662-44371-2_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Inc, Profiling with Traceview and dmtracedump

J. Heyszl, A. Ibing, S. Mangard, F. D. Santis, and G. Sigl, Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations, IACR Cryptology ePrint Archive, vol.438438, 2013.

G. Kenworthy and P. Rohatgi, Mobile Device Security: The case for side channel resistance

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, LNCS, vol.1666, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

T. H. Le, J. Clédiere, C. Serviere, and J. L. Lacoume, Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, pp.710-720
DOI : 10.1109/TIFS.2007.910252

O. Project, OpenSSL library documentation

O. Corporation and . Java, oracle. com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html. 20. RELIC library (UNICAMP). available at https

Y. Souissi, A. E. Aabid, N. Debande, S. Guilley, and J. Danger, Novel Applications of Wavelet Transforms based Side-Channel Analysis. Non-Invasive Attack Testing Workshop, 2011.

Y. Souissi, S. Guilley, J. Danger, S. Mekki, and G. Duc, Improvement of power analysis attacks using Kalman filter, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1778-1781, 2010.
DOI : 10.1109/ICASSP.2010.5495428

M. Vuagnoux and S. Pasini, Compromising electromagnetic emanations of wired and wireless keyboards, Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, pp.1-16, 2009.

C. D. Walter, Sliding Windows Succumbs to Big Mac Attack, CHES, pp.286-299, 2001.
DOI : 10.1007/3-540-44709-1_24

C. Zenger, C. Paar, K. Lemke-rust, T. Kasper, and D. Oswald, SEMA of RSA on a Smartphone, B.Sc, vol.1710, 2011.