M. Akkar and C. Giraud, An Implementation of DES and AES, Secure against Some Attacks, CHES, pp.309-318, 2001.
DOI : 10.1007/3-540-44709-1_26

A. Bogdanov, Improved Side-Channel Collision Attacks on AES, Selected Areas in Cryptography -SAC 2007, pp.84-95, 2007.
DOI : 10.1007/978-3-540-77360-3_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.1652

A. Bogdanov, Multiple-Differential Side-Channel Collision Attacks on AES, Cryptographic Hardware and Embedded Systems -CHES 2008, pp.30-44, 2008.
DOI : 10.1007/978-3-540-85053-3_3

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

D. Canright and L. Batina, A Very Compact ???Perfectly Masked??? S-Box for AES, Applied Cryptography and Network Security, 6th International Conference -ACNS 2008, pp.446-459, 2008.
DOI : 10.1007/978-3-540-68914-0_27

C. Clavier, An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, International Conference on Information Systems Security - ICISS 2007, pp.143-155, 2007.
DOI : 10.1007/978-3-540-77086-2_11

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual Information Analysis, Cryptographic Hardware and Embedded Systems CHES 2008, pp.426-442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

J. Dj, C. Golic, and . Tymen, Multiplicative Masking and Power Analysis of AES, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.198-212, 2002.

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology -CRYPTO '99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

P. C. Kocher, J. M. Jaffe, and B. C. June, DES and Other Cryptographic Processes with Leak Minimization for Smartcards and other CryptoSystems, journal = US Patent, vol.6278, p.783, 1998.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2007.

S. Mangard, N. Pramstaller, and E. Oswald, Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems -CHES 2005, pp.157-171, 2005.
DOI : 10.1007/11545262_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.2680

T. S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, Cryptographic Hardware and Embedded Systems -CHES 2000, pp.238-251, 1965.
DOI : 10.1007/3-540-44499-8_19

T. S. Messerges, Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption, 7th International Workshop - FSE 2000, pp.150-164, 1978.
DOI : 10.1007/3-540-44706-7_11

A. Moradi, O. Mischke, and T. Eisenbarth, Correlation-Enhanced Power Analysis Collision Attack, CHES, pp.125-139, 2010.
DOI : 10.1007/978-3-642-15031-9_9

E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen, A Side-Channel Analysis Resistant Description of the AES S-Box, Fast Software Encryption: 12th International Workshop, FSE 2005, pp.413-423, 2005.
DOI : 10.1007/11502760_28

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems -CHES 2010, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

K. Schramm, G. Leander, P. Felke, and C. Paar, A Collision-Attack on AES, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.163-175, 2004.
DOI : 10.1007/978-3-540-28632-5_12

K. Schramm, T. J. Wollinger, and C. Paar, A New Class of Collision Attacks and Its Application to DES, Fast Software Encryption -FSE 2003, pp.206-222, 2003.
DOI : 10.1007/978-3-540-39887-5_16

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology -EUROCRYPT 2009, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

F. Standaert, N. Veyrat-charvillon, E. Oswald, B. Gierlichs, M. Medwed et al., The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology -ASIACRYPT 2010, pp.112-129, 2010.
DOI : 10.1007/978-3-642-17373-8_7

F. Marc, J. G. Witteman, F. Van-woudenberg, and . Menarini, Defeating rsa multiply-always and message blinding countermeasures, CT-RSA, pp.77-88, 2011.