The EM Side???Channel(s), CHES, pp.29-45, 2002. ,
DOI : 10.1007/3-540-36400-5_4
An Implementation of DES and AES, Secure against Some Attacks, Proceedings of CHES'01, pp.309-318, 2001. ,
DOI : 10.1007/3-540-44709-1_26
A Generic Protection against High-Order Differential Power Analysis, Proceedings of FSE'03, pp.192-205, 2003. ,
DOI : 10.1007/978-3-540-39887-5_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.641.9911
Towards Sound Approaches to Counteract Power-Analysis Attacks, CRYPTO, volume 1666, pp.3-540, 1999. ,
DOI : 10.1007/3-540-48405-1_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8951
Template Attacks, CHES, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
A White-Box DES Implementation for DRM Applications, Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, pp.1-15, 2002. ,
DOI : 10.1007/978-3-540-44993-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.8529
Affine Masking against Higher-Order Side Channel Analysis, Cryptology ePrint Archive, vol.58, issue.6, 2010. ,
DOI : 10.1007/3-540-45325-3_6
Revisiting Higher-Order DPA Attacks:, CT-RSA, pp.221-234, 2010. ,
DOI : 10.1007/978-3-642-11925-5_16
Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA, ETRI Journal, vol.30, issue.2, pp.315-325, 2008. ,
DOI : 10.4218/etrij.08.0107.0167
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Differential Power Analysis, CRYPTO, volume 1666 of LNCS, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
DES and Differential Power Analysis The ???Duplication??? Method, 1999. ,
DOI : 10.1007/3-540-48059-5_15
Enhanced DES implementation secure against differential power analysis in smart-cards, Information Security and Privacy, 10th Australasian Conference, pp.195-206, 2005. ,
DOI : 10.1007/11506157_17
Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks Complete version online, SCS, IEEE, pp.1-6, 2009. ,
Entropy-based power attack, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.1-6, 2010. ,
DOI : 10.1109/HST.2010.5513124
URL : https://hal.archives-ouvertes.fr/hal-00618482
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Successfully Attacking Masked AES Hardware Implementations, Proceedings of CHES'05, pp.157-171, 2005. ,
DOI : 10.1007/11545262_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.2680
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations, CHES, pp.76-90 ,
DOI : 10.1007/11894063_7
Using Second-Order Power Analysis to Attack DPA Resistant Software, CHES, pp.71-77, 1965. ,
DOI : 10.1007/3-540-44499-8_19
Improved Higher-Order Side-Channel Attacks with FPGA Experiments, CHES, pp.309-323, 2005. ,
DOI : 10.1007/11545262_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.7300
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, CHES, pp.171-188, 2009. ,
DOI : 10.1007/978-3-642-04138-9_13
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009. ,
DOI : 10.1007/978-3-642-00730-9_16
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks, 2006 International Conference on Field Programmable Logic and Applications, 2006. ,
DOI : 10.1109/FPL.2006.311315
Towards Efficient Second-Order Power Analysis, CHES, pp.1-15, 2004. ,
DOI : 10.1007/978-3-540-28632-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.460.2991