P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Proceedings of CRYPTO'99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems. CHES '01, pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990

G. Hospodar, B. Gierlichs, E. De-mulder, I. Verbauwhede, and J. Vandewalle, Machine learning in side-channel analysis: a first study, Journal of Cryptographic Engineering, vol.51, issue.4, pp.293-302, 2011.
DOI : 10.1007/s13389-011-0023-x

L. Lerman, G. Bontempi, and O. Markowitch, A machine learning approach against a masked AES, Journal of Cryptographic Engineering, vol.7, issue.15, pp.123-139, 2015.
DOI : 10.1007/s13389-014-0089-3

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, 2002.
DOI : 10.1007/978-3-662-04722-4

Z. Gong, S. Nikova, and Y. W. Law, KLEIN: A New Family of Lightweight Block Ciphers, pp.1-18, 2012.
DOI : 10.1007/978-3-642-25286-0_1

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, LNCS, vol.4727, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.122.2536

W. Zhang, Z. Bao, D. Lin, V. Rijmen, B. Yang et al., RECTANGLE: ?????????????????????????????????????????????????????????, Science China Information Sciences, vol.41, issue.12, pp.1-15, 2015.
DOI : 10.1007/s11432-015-5459-7

A. Journault, F. X. Standaert, and K. Varici, Improving the security and efficiency of block ciphers based on LS-designs, Designs, Codes and Cryptography, vol.82, issue.1-2, pp.1-15, 2016.
DOI : 10.1007/s10623-016-0193-8

URL : https://hal.archives-ouvertes.fr/hal-01276503

B. Gérard, V. Grosso, M. Naya-plasencia, and F. Standaert, Block Ciphers That Are Easier to Mask: How Far Can We Go?, pp.383-399
DOI : 10.1007/978-3-642-40349-1_22

V. Grosso, G. Leurent, F. X. Standaert, and K. Var?c?, LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations, pp.18-37, 2015.
DOI : 10.1007/978-3-662-46706-0_2

URL : https://hal.archives-ouvertes.fr/hal-01093491

Y. Fei, Q. Luo, and A. A. Ding, A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, LNCS, vol.7428, pp.233-250, 2012.
DOI : 10.1007/978-3-642-33027-8_14

A. Thillard, E. Prouff, and T. Roche, Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack, pp.27-48
DOI : 10.1007/978-3-642-40349-1_2

´. E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, LNCS, vol.3156, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

N. Csd, Advanced Encryption Standard (AES) FIPS PUB 197, 2001.

M. Ullrich, C. De-cannire, S. Indesteege, N. Mouha, and B. Preneel, Finding Optimal Bitsliced Implementations of 4 4-bit S-Boxes, SKEW 2011 Symmetric Key Encryption Workshop, 2011.

T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning. Springer Series in Statistics, 2001.

S. Guilley, A. Heuser, and O. Rioul, A Key to Success -Success Exponents for Side- Channel Distinguishers, Progress in Cryptology - INDOCRYPT 2015 -16th International Conference on Cryptology in India Proceedings. Volume 9462 of Lecture Notes in Computer Science, pp.270-290, 2015.

S. Picek, K. Papagiannopoulos, B. Ege, L. Batina, and D. Jakobovic, Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes, Progress in Cryptology ? INDOCRYPT 2014: 15th International Conference on Cryptology in India, pp.374-390, 2014.
DOI : 10.1007/978-3-319-13039-2_22

T. M. Mitchell, Machine Learning. 1 edn, 1997.

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, In: CHES. LNCS, vol.2523, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

J. R. Quinlan, C4.5: Programs for Machine Learning, 1993.

E. Frank and I. H. Witten, Generating Accurate Rule Sets Without Global Optimization, Fifteenth International Conference on Machine Learning, pp.144-151, 1998.

R. Collobert and S. Bengio, Links between perceptrons, MLPs and SVMs, Twenty-first international conference on Machine learning , ICML '04, p.23, 2004.
DOI : 10.1145/1015330.1015415

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7582