J. S. Coron and L. Goubin, On Boolean and Arithmetic Masking against Differential Power Analysis, Cryptographic Hardware and Embedded Systems ? CHES, pp.231-237, 1965.
DOI : 10.1007/3-540-44499-8_18

URL : http://www.gemplus.com/smart/r_d/publications/ps/CG00mask.ps

J. Bringer, H. Chabanne, and T. H. Le, Protecting AES against side-channel analysis using wire-tap codes, Journal of Cryptographic Engineering, vol.54, issue.8, pp.129-141, 2012.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

J. Bringer, C. Carlet, H. Chabanne, S. Guilley, and H. Maghrebi, Orthogonal Direct Sum Masking, Information Security Theory and Practice International Workshop ? WISTP 2014, pp.40-56, 2014.
DOI : 10.1007/978-3-662-43826-8_4

URL : https://hal.archives-ouvertes.fr/hal-01400919

P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems Advances in Cryptology ? CRYPTO '96, LNCS, vol.1109, pp.104-113, 1996.

P. Kocher, J. Jaffe, and B. Jun, Introduction to Differential Power Analysis and Related Attacks, Cryptography Research Inc, 1998.
DOI : 10.1007/s13389-011-0006-y

T. Messerges, Power Analysis Attacks and Countermeasures for Cryptographic Algorithms, 2000.

T. Messerges, E. Dabbish, and R. Sloan, Power Analysis Attacks of Modular Exponentiation in Smartcards, Cryptographic Hardware and Embedded Systems ? CHES '99, pp.144-157, 1999.
DOI : 10.1007/3-540-48059-5_14

J. S. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems ? CHES '99, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems ? CHES 2010, 2010.
DOI : 10.1007/978-3-642-15031-9_28

URL : https://eprint.iacr.org/2010/441.pdf

A. Moradi, Wire-Tap Codes as Side-Channel Countermeasure -an FPGA-based experiment, Progress in Cryptology ? INDOCRYPT 2014, pp.341-359, 2014.
DOI : 10.1007/978-3-319-13039-2_20

S. Azzi, B. Barras, M. Christofi, and D. Vigilant, Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification, PROOFS: Security Proofs for Embedded Systems, 2015.
DOI : 10.1007/s13389-013-0065-3

S. Bela¨?dbela¨?d, P. Fouque, and B. Gérard, Side-channel analysis of multiplications in GF (2 128 ) -application to AES-GCM, LNCS, vol.8874, pp.306-325, 2014.

S. Belad, J. S. Coron, P. A. Fouque, B. Grard, J. G. Kammerer et al., Improved Side-Channel Analysis of Finite-Field Multiplication, Cryptology ePrint Archive Report, vol.2015542, 2015.
DOI : 10.1007/978-3-662-48324-4_20