1. Kocher PC, Jaffe J, Jun B (1999) Differential Power Analysis. In: Wiener MJ (ed) CRYPTO, ser. Lecture Notes in Computer Science. Springer
2. Schindler W, Lemke K, Paar C (2005) A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao JR, Sunar B (eds) CHES, ser. Lecture Notes in Computer Science. Springer
3. P. C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in proceedings of the 19th annual international cryptology conference on advances in cryptology, ser. CRYPTO '99. London, UK, UK: springer-Verlag, 1999, pp. 388–397. [online]. Available
4. T. Roche, V. Lomne, C. Mutschler, and L. Imbert, AAsidejourney to 'titan," in 30th USENIX security symposium (USENIX security 21). USENIX Association, Aug. 2021, pp. 231–248.
5. Monaco JV (2018) Sok: Keylogging side channels. In: 2018 IEEE Symposium on Security and Privacy (SP), pp 211–228