Differential Power Analysis, CRYPTO '99, pp.388-397 ,
Correlation Power Analysis with a Leakage Model, CHES 2004, pp.16-29 ,
DOI : 10.1007/978-3-540-28632-5_2
Yanis Linge, Bruno Robisson, and Assia Tria. A Unified Formalism for Physical Attacks, 2014. ,
Unknown Plaintext Template Attacks, WISA 2009, pp.148-162 ,
DOI : 10.1007/978-3-642-10838-9_12
Template Attacks in Principal Subspaces, CHES 2006, pp.1-14 ,
DOI : 10.1007/11894063_1
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, ICISC 2002, pp.343-358 ,
DOI : 10.1007/3-540-36552-4_24
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, SAC 2012, pp.390-406 ,
DOI : 10.1007/978-3-642-35999-6_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7441
Improved Side-Channel Analysis of Finite-Field Multiplication, CHES 2015, pp.395-415 ,
Counting Keys in Parallel After a Side Channel Attack, ASIACRYPT 2015, pp.313-337 ,
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks, IACR Cryptology ePrint, vol.1, issue.4, 2015. ,
DOI : 10.1007/978-3-642-35999-6_25
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting, CHES 2012, pp.175-192 ,
DOI : 10.1007/978-3-642-33027-8_11
Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, Smart Card Research and Advanced Applications, pp.215-232, 2014. ,
DOI : 10.1007/978-3-319-16763-3_13
Soft Analytical Side-Channel Attacks, ASIACRYPT 2014, pp.282-296 ,
DOI : 10.1007/978-3-662-45611-8_15
URL : https://hal.archives-ouvertes.fr/hal-01096218
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, ASIACRYPT 2015, pp.291-312 ,
DOI : 10.1007/978-3-662-48800-3_12
How Fast can be Algebraic Attacks on Block Ciphers?, Symmetric Cryptography, volume 07021 of Dagstuhl Seminar Proceedings, 2007. ,
Algebraic Cryptanalysis of AES: An Overview, 2005. ,
Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding, pp.152-169, 2007. ,
Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, COSADE 2014, pp.199-213 ,
DOI : 10.1007/978-3-319-10175-0_14
A Stochastic Model for Differential Side Channel Cryptanalysis, CHES 2005, 2005. ,
DOI : 10.1007/11545262_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.363.2705
Bayesian Reasoning and Machine Learning, 2011. ,
DOI : 10.1017/CBO9780511804779
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.232.8159
Factor graphs and the sum-product algorithm, IEEE Trans. on Information Theory, vol.47, issue.2, pp.498-519, 2001. ,
Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, pp.21-28, 1962. ,
DOI : 10.1109/TIT.1962.1057683
A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 1981. ,
DOI : 10.1109/TIT.1981.1056404
Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach, National Conference on Artificial Intelligence, pp.133-136, 1982. ,
On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit, IEEE Communications Letters, vol.5, issue.2, pp.58-60, 2001. ,
DOI : 10.1109/4234.905935