B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual Information Analysis, Cryptographic Hardware and Embedded Systems CHES, p.426442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

N. Veyrat-charvillon and F. X. Standaert, Mutual Information Analysis: How, When and Why?, Cryptographic Hardware and Embedded Systems CHES 2009, p.429443, 2009.
DOI : 10.1007/978-3-642-04138-9_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.6511

E. Prou and M. Rivain, Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis, Applied Cryptography and Network Security, p.499518, 2009.

M. A. Stephens, EDF Statistics for Goodness of Fit and Some Comparisons, Journal of the American Statistical Association, vol.10, issue.1, p.730737, 1974.
DOI : 10.1111/j.1467-9574.1967.tb00548.x

C. Whitnall and E. Oswald, A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework, Lecture Notes in Computer Science, vol.6841, p.316334, 2011.
DOI : 10.1007/978-3-642-22792-9_18

J. Peacock, Two-dimensional goodness-of-fit testing in astronomy, Monthly Notices of the Royal Astronomical Society, vol.202, issue.3, p.615627, 1983.
DOI : 10.1093/mnras/202.3.615

G. Fasano and A. Franceschini, A multidimensional version of the Kolmogorov???Smirnov test, Monthly Notices of the Royal Astronomical Society, vol.225, issue.1, p.155170, 1987.
DOI : 10.1093/mnras/225.1.155

S. Mangard, E. Oswald, and F. X. Standaert, One for All -All for One: Unifying Standard DPA Attacks, IET Information Security, vol.5, issue.2, p.100110, 2011.
DOI : 10.1049/iet-ifs.2010.0096

L. Batina, B. Gierlichs, E. Prou, M. Rivain, F. X. Standaert et al., Mutual Information Analysis: a??Comprehensive Study, Journal of Cryptology, vol.4, issue.3, p.123, 2010.
DOI : 10.1147/rd.41.0066

L. Paninski, Estimation of Entropy and Mutual Information, Neural Computation, vol.25, issue.6, p.11911253, 2003.
DOI : 10.1103/PhysRevE.52.6841

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.3431

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2007.

H. C. Kraemer and S. Thiemann, How Many Subjects?: Statistical Power Analysis in Research. 1 edn, 1987.
DOI : 10.4135/9781483398761

S. Guilley, P. Hoogvorst, and R. Pacalet, Dierential Power Analysis Model and Some Results, p.127142, 2004.
DOI : 10.1007/1-4020-8147-2_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.7616

S. Chari, J. Rao, and P. Rohatgi, Template Attacks, Cryptographic Hardware and Embedded Systems, p.5162, 2002.
DOI : 10.1007/3-540-36400-5_3

M. Akkar, R. Bevan, P. Dischamp, and D. Moyart, Power Analysis, What is Now Possible Advances in Cryptology ASIACRYPT, Lecture Notes in Computer Science, p.489502, 1976.

S. Mangard, N. Pramstaller, and E. Oswald, Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems 2005, p.157171, 2005.
DOI : 10.1007/11545262_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.2680

M. Renauld, F. X. Standaert, N. Veyrat-charvillon, D. Kamel, and D. Flandre, A formal study of power variability issues and side-channel attacks for nanoscale devices Advances in Cryptology: EUROCRYPT 2011, Lecture Notes in Computer Science, vol.6632, p.109128, 2011.

E. Prou, DPA Attacks and S-Boxes. Fast Software Encryption, Lecture Notes in Computer Science, vol.3557, p.424441, 2005.