D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, The EM Side???Channel(s), CHES, pp.29-45, 2002.
DOI : 10.1007/3-540-36400-5_4

M. Akkar and C. Giraud, An Implementation of DES and AES, Secure against Some Attacks, Proceedings of CHES'01, pp.309-318, 2001.
DOI : 10.1007/3-540-44709-1_26

M. Akkar and L. Goubin, A Generic Protection against High-Order Differential Power Analysis, Proceedings of FSE'03, pp.192-205, 2003.
DOI : 10.1007/978-3-540-39887-5_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.641.9911

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, CRYPTO, volume 1666, pp.3-540, 1999.
DOI : 10.1007/3-540-48405-1_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8951

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

S. Chow, P. A. Eisen, H. Johnson, and P. C. Van-oorschot, A White-Box DES Implementation for DRM Applications, Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, pp.1-15, 2002.
DOI : 10.1007/978-3-540-44993-5_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.8529

G. Fumaroli, A. Martinelli, E. Prouff, and M. Rivain, Affine Masking against Higher-Order Side Channel Analysis, Cryptology ePrint Archive, vol.58, issue.6, 2010.
DOI : 10.1007/3-540-45325-3_6

B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, Revisiting Higher-Order DPA Attacks:, CT-RSA, pp.221-234, 2010.
DOI : 10.1007/978-3-642-11925-5_16

C. Kim, M. Schläffer, and S. Moon, Differential Side Channel Analysis Attacks on FPGA Implementations of ARIA, ETRI Journal, vol.30, issue.2, pp.315-325, 2008.
DOI : 10.4218/etrij.08.0107.0167

P. C. Kocher, J. Jaffe, and B. Jun, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO, volume 1666 of LNCS, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

L. Goubin and J. Patarin, DES and Differential Power Analysis The ???Duplication??? Method, 1999.
DOI : 10.1007/3-540-48059-5_15

J. Lv and Y. Han, Enhanced DES implementation secure against differential power analysis in smart-cards, Information Security and Privacy, 10th Australasian Conference, pp.195-206, 2005.
DOI : 10.1007/11506157_17

H. Maghrebi, J. Danger, F. Flament, and S. Guilley, Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks Complete version online, SCS, IEEE, pp.1-6, 2009.

H. Maghrebi, S. Guilley, J. Danger, and F. Flament, Entropy-based power attack, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.1-6, 2010.
DOI : 10.1109/HST.2010.5513124

URL : https://hal.archives-ouvertes.fr/hal-00618482

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

S. Mangard, N. Pramstaller, and E. Oswald, Successfully Attacking Masked AES Hardware Implementations, Proceedings of CHES'05, pp.157-171, 2005.
DOI : 10.1007/11545262_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.2680

S. Mangard and K. Schramm, Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations, CHES, pp.76-90
DOI : 10.1007/11894063_7

T. S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, CHES, pp.71-77, 1965.
DOI : 10.1007/3-540-44499-8_19

F. Peeters, N. Standaert, J. Donckers, and . Quisquater, Improved Higher-Order Side-Channel Attacks with FPGA Experiments, CHES, pp.309-323, 2005.
DOI : 10.1007/11545262_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.7300

M. Rivain, E. Prouff, and J. Doget, Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, CHES, pp.171-188, 2009.
DOI : 10.1007/978-3-642-04138-9_13

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009.
DOI : 10.1007/978-3-642-00730-9_16

F. Standaert, G. Rouvroy, and J. Quisquater, FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks, 2006 International Conference on Field Programmable Logic and Applications, 2006.
DOI : 10.1109/FPL.2006.311315

J. Waddle and D. Wagner, Towards Efficient Second-Order Power Analysis, CHES, pp.1-15, 2004.
DOI : 10.1007/978-3-540-28632-5_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.460.2991