C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential Power Analysis, CRYPTO '99, pp.388-397

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES 2004, pp.16-29
DOI : 10.1007/978-3-540-28632-5_2

L. Héì-ene, R. Bouder, and . Lashermes, Yanis Linge, Bruno Robisson, and Assia Tria. A Unified Formalism for Physical Attacks, 2014.

N. Hanley, M. Tunstall, and W. P. Marnane, Unknown Plaintext Template Attacks, WISA 2009, pp.148-162
DOI : 10.1007/978-3-642-10838-9_12

C. Archambeau, E. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, CHES 2006, pp.1-14
DOI : 10.1007/11894063_1

S. Mangard, A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, ICISC 2002, pp.343-358
DOI : 10.1007/3-540-36552-4_24

N. Veyrat-charvillon, B. Gérard, M. Renauld, and F. Standaert, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, SAC 2012, pp.390-406
DOI : 10.1007/978-3-642-35999-6_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7441

S. Bela¨?dbela¨?d, P. Jean-sébastien-coron, B. Fouque, J. Gérard, E. Kammerer et al., Improved Side-Channel Analysis of Finite-Field Multiplication, CHES 2015, pp.395-415

P. Daniel, . Martin, F. Jonathan, E. Connell, M. Oswald et al., Counting Keys in Parallel After a Side Channel Attack, ASIACRYPT 2015, pp.313-337

A. Bogdanov, I. Kizhvatov, K. Manzoor, E. Tischhauser, and M. Witteman, Fast and Memory-Efficient Key Recovery in Side-Channel Attacks, IACR Cryptology ePrint, vol.1, issue.4, 2015.
DOI : 10.1007/978-3-642-35999-6_25

B. Gérard and F. Standaert, Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting, CHES 2012, pp.175-192
DOI : 10.1007/978-3-642-33027-8_11

X. Ye, T. Eisenbarth, and W. Martin, Bounded, yet Sufficient? How to Determine Whether Limited Side Channel Information Enables Key Recovery, Smart Card Research and Advanced Applications, pp.215-232, 2014.
DOI : 10.1007/978-3-319-16763-3_13

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Soft Analytical Side-Channel Attacks, ASIACRYPT 2014, pp.282-296
DOI : 10.1007/978-3-662-45611-8_15

URL : https://hal.archives-ouvertes.fr/hal-01096218

V. Grosso and F. Standaert, ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?, ASIACRYPT 2015, pp.291-312
DOI : 10.1007/978-3-662-48800-3_12

N. Courtois, How Fast can be Algebraic Attacks on Block Ciphers?, Symmetric Cryptography, volume 07021 of Dagstuhl Seminar Proceedings, 2007.

H. Nover, Algebraic Cryptanalysis of AES: An Overview, 2005.

T. Nicolas, G. V. Courtois, and . Bard, Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding, pp.152-169, 2007.

Y. Linge, C. Dumas, and S. Lambert-lacroix, Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, COSADE 2014, pp.199-213
DOI : 10.1007/978-3-319-10175-0_14

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, CHES 2005, 2005.
DOI : 10.1007/11545262_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.363.2705

D. Barber, Bayesian Reasoning and Machine Learning, 2011.
DOI : 10.1017/CBO9780511804779

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.232.8159

R. Frank, B. J. Kschischang, H. Frey, and . Loeliger, Factor graphs and the sum-product algorithm, IEEE Trans. on Information Theory, vol.47, issue.2, pp.498-519, 2001.

R. G. Gallager, Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, pp.21-28, 1962.
DOI : 10.1109/TIT.1962.1057683

R. M. Tanner, A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 1981.
DOI : 10.1109/TIT.1981.1056404

J. Pearl, Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach, National Conference on Artificial Intelligence, pp.133-136, 1982.

S. Chung, G. David-forney-jr, J. Thomas, R. L. Richardson, and . Urbanke, On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit, IEEE Communications Letters, vol.5, issue.2, pp.58-60, 2001.
DOI : 10.1109/4234.905935