Mutual Information Analysis, Cryptographic Hardware and Embedded Systems CHES, p.426442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Mutual Information Analysis: How, When and Why?, Cryptographic Hardware and Embedded Systems CHES 2009, p.429443, 2009. ,
DOI : 10.1007/978-3-642-04138-9_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.6511
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis, Applied Cryptography and Network Security, p.499518, 2009. ,
EDF Statistics for Goodness of Fit and Some Comparisons, Journal of the American Statistical Association, vol.10, issue.1, p.730737, 1974. ,
DOI : 10.1111/j.1467-9574.1967.tb00548.x
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework, Lecture Notes in Computer Science, vol.6841, p.316334, 2011. ,
DOI : 10.1007/978-3-642-22792-9_18
Two-dimensional goodness-of-fit testing in astronomy, Monthly Notices of the Royal Astronomical Society, vol.202, issue.3, p.615627, 1983. ,
DOI : 10.1093/mnras/202.3.615
A multidimensional version of the Kolmogorov???Smirnov test, Monthly Notices of the Royal Astronomical Society, vol.225, issue.1, p.155170, 1987. ,
DOI : 10.1093/mnras/225.1.155
One for All -All for One: Unifying Standard DPA Attacks, IET Information Security, vol.5, issue.2, p.100110, 2011. ,
DOI : 10.1049/iet-ifs.2010.0096
Mutual Information Analysis: a??Comprehensive Study, Journal of Cryptology, vol.4, issue.3, p.123, 2010. ,
DOI : 10.1147/rd.41.0066
Estimation of Entropy and Mutual Information, Neural Computation, vol.25, issue.6, p.11911253, 2003. ,
DOI : 10.1103/PhysRevE.52.6841
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.3431
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2007. ,
How Many Subjects?: Statistical Power Analysis in Research. 1 edn, 1987. ,
DOI : 10.4135/9781483398761
Dierential Power Analysis Model and Some Results, p.127142, 2004. ,
DOI : 10.1007/1-4020-8147-2_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.7616
Template Attacks, Cryptographic Hardware and Embedded Systems, p.5162, 2002. ,
DOI : 10.1007/3-540-36400-5_3
Power Analysis, What is Now Possible Advances in Cryptology ASIACRYPT, Lecture Notes in Computer Science, p.489502, 1976. ,
Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems 2005, p.157171, 2005. ,
DOI : 10.1007/11545262_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.2680
A formal study of power variability issues and side-channel attacks for nanoscale devices Advances in Cryptology: EUROCRYPT 2011, Lecture Notes in Computer Science, vol.6632, p.109128, 2011. ,
DPA Attacks and S-Boxes. Fast Software Encryption, Lecture Notes in Computer Science, vol.3557, p.424441, 2005. ,