M. Akkar and C. Giraud, An Implementation of DES and AES, Secure against Some Attacks, Cryptographic Hardware and Embedded Systems ? CHES 2001, pp.309-318, 2001.
DOI : 10.1007/3-540-44709-1_26

G. Bertoni, J. Daemen, M. Peeters, and G. Van-assche, Keccak sponge function family main document Submission to NIST (Round 1) Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes, Cryptographic Hardware and Embedded Systems -CHES 2012, pp.76-91, 2008.

S. Bilgin, V. Nikova, V. Nikov, N. N. Rijmen, V. Tokareva et al., Threshold implementations of small S-boxes, Can16] Anne Canteaut. Lecture Notes on Cryptographic Boolean, pp.3-33, 2015.
DOI : 10.1109/DATE.2004.1268856

S. Chari, C. Jutla, J. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology - CRYPTO '99, pp.398-412, 1999.
DOI : 10.1007/3-540-48405-1_26

C. De-cannière and . Ku-leuven, Analysis and Design of Symmetric Encryption Algorithms [GP99] Louis Goubin and Jacques Patarin. DES and diierential power analysis (the "duplication" method), Cryptographic Hardware and Embedded Systems, CHES'99GU63] René Goscinny and Albert Uderzo. Astérix et Cléopatre. Dargaud, pp.158-172, 1963.

C. Paul and . Kocher, Timing Attacks on Implementations of Diie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology -CRYPTO '96, pp.104-113, 1996.

S. Mangard, N. Pramstaller, and E. Oswald, Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems -CHES 2005, pp.157-171, 2005.
DOI : 10.1007/11545262_12

URL : http://www.iacr.org/cryptodb/archive/2005/CHES/583/583.pdf

F. Macwilliams and N. Sloane, The Theory of Error-Correcting Codes, 1977.

S. Nikova, C. Rechberger, and V. Rijmen, Threshold Implementations Against Side-Channel Attacks and Glitches, Information and Communications Security, pp.529-545, 2006.
DOI : 10.1007/11935308_38

S. Nikova, V. Rijmen, and M. Schlääer, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, Journal of Cryptology, vol.22, issue.11, pp.292-321, 2011.
DOI : 10.1145/359168.359176

[. Standaert, Introduction to Side-Channel Attacks, Secure Integrated Circuits and Systems, pp.27-42
DOI : 10.1007/978-0-387-71829-3_2