C. Eric-brier, F. Clavier, and . Olivier, Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

C. Clavier, J. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, CHES, pp.252-263, 2000.
DOI : 10.1007/3-540-44499-8_20

I. Jean-sébastien-coron and . Kizhvatov, Analysis and Improvement of the Random Delay Countermeasure of CHES, CHES, pp.95-109, 2009.

M. Frigo and S. G. Johnson, The Design and Implementation of FFTW3, Proceedings of the IEEE, pp.216-231, 2005.
DOI : 10.1109/JPROC.2004.840301

C. H. Gebotys, S. Ho, and C. C. Tiu, EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, CHES, pp.250-264, 2005.
DOI : 10.1007/11545262_19

N. Homma, S. Nagashima, Y. Imai, T. Aoki, and A. Satoh, High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching, CHES, pp.187-200, 2006.
DOI : 10.1007/11894063_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.3061

N. Homma, S. Nagashima, T. Sugawara, T. Aoki, and A. Satoh, A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.91, issue.1, pp.91-193, 2008.
DOI : 10.1093/ietfec/e91-a.1.193

M. Kafi, S. Guilley, S. Marcello, and D. Naccache, Deconvolving Protected Signals, 2009 International Conference on Availability, Reliability and Security, pp.687-694
DOI : 10.1109/ARES.2009.197

T. Kasper, D. Oswald, and C. Paar, EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment, WISA, pp.79-93, 2009.
DOI : 10.1007/978-3-642-10838-9_7

K. J. Kulikowski, M. G. Karpovsky, and A. Taubin, Power Attacks on Secure Hardware Based on Early Propagation of Data, 12th IEEE International On-Line Testing Symposium (IOLTS'06), pp.131-138, 2006.
DOI : 10.1109/IOLTS.2006.49

T. Le, C. Jessyclédì-ere, B. Canovas, and . Robisson, ChristineServì ere, and Jean-Louis Lacoume. A Proposition for Correlation Power Analysis Enhancement, CHES, pp.174-186, 2006.

S. Mangard, Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, Lecture Notes in Computer Science, vol.2964, pp.222-235, 2004.
DOI : 10.1007/978-3-540-24660-2_18

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

E. Mateos and C. H. Gebotys, A new correlation frequency analysis of the side channel, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, pp.1-4, 2010.
DOI : 10.1145/1873548.1873552

S. Nagashima, N. Homma, Y. Imai, T. Aoki, and A. Satoh, DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure, 2007 IEEE International Symposium on Circuits and Systems, pp.1807-1810, 2007.
DOI : 10.1109/ISCAS.2007.378024

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.491.7920

D. Réal, C. Canovas, M. Jessyclédì-ere, F. Drissi, and . Valette, Defeating classical hardware countermeasures, Proceedings of the conference on Design, automation and test in Europe, DATE '08, pp.1274-1279, 2008.
DOI : 10.1145/1403375.1403684

M. Rivain, E. Prouff, and J. Doget, Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, CHES, pp.171-188, 2009.
DOI : 10.1007/978-3-642-04138-9_13

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009.
DOI : 10.1007/978-3-642-00730-9_16

D. Suzuki and M. Saeki, Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style, CHES, pp.255-269, 2006.
DOI : 10.1007/11894063_21

M. Tunstall and O. Beno??tbeno??t, Efficient Use of Random Delays in Embedded Software, WISTP, pp.27-38, 2007.
DOI : 10.1007/978-3-540-30580-4_3

G. J. Jasper, M. F. Van-woudenberg, B. Witteman, and . Bakker, Improving Differential Power Analysis by Elastic Alignment