J. Doget, E. Prouff, M. Rivain, and F. X. Standaert, Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.34, issue.9, pp.123-144, 2011.
DOI : 10.1007/s13389-011-0010-2

T. S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems. CHES '00, pp.238-251, 2000.
DOI : 10.1007/3-540-44499-8_19

J. Mendel, Lessons in Estimation Theory for Signal Processing, Communications, and Control, 1995.

E. Kamen and J. Su, Introduction to optimal estimation Advanced textbooks in control and signal processing, 1999.

J. Candy, Bayesian Signal Processing: Classical, Modern and Particle Filtering Methods Adaptive and Learning Systems for Signal Processing, Communications and Control Series, 2011.

S. Anderson, Statistical methods for comparative studies: techniques for bias reduction Wiley series in probability and mathematical statistics: Applied probability and statistics, 1980.
DOI : 10.1002/9780470316498

E. W. Kamen and J. S. , Introduction to optimal estimation Advanced textbooks in control and signal processing Control and Signal Processing Series, 1999.

Y. Bar-shalom, X. Li, and T. Kirubarajan, Estimation with applications to tracking and navigation, 2001.
DOI : 10.1002/0471221279

A. Bos, Parameter estimation for scientists and engineers, 2007.

D. Sorensen and D. Gianola, Likelihood, Bayesian and MCMC methods in quantitative genetics. Statistics for biology and health, 2002.

A. Sharma and M. Prakash, Linear Transformation, 2007.

G. Saporta, Data mining et statistique décisionnelle. L'intelligence des données, 2010.

J. Proakis and M. Salehi, Digital communications. McGraw-Hill higher education, 2008.

B. Arnold, E. Castillo, and J. Sarabia, Conditional specification of statistical models. Springer series in statistics, 1999.

S. Guilley, Documentation technique de la conception physique (ou back-end ) du circuit SECMAT, 2006.

S. Guilley, . Enst-/-cnrs, and . Ltci, Geometrical Counter-Measures against Side-Channel Attacks, 2007.

R. Russo, Statistics for the behavioural sciences: an introduction, 2003.

B. Rosner, Fundamentals of biostatistics, 2010.

L. Batina, B. Gierlichs, and K. Lemke-rust, Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip, In: ISC. Lecture Notes in Computer Science, vol.5222, pp.341-354, 2008.
DOI : 10.1007/978-3-540-85886-7_24

F. X. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, LNCS, vol.28, issue.2, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26