1. E. Biham, A. Shamir. Power analysis of the key scheduling of the AES candidates, Proceedings of the second AES Candidate Conference, March 1999, pp. 115–121.
2. Lect Notes Comput Sci;E. Brickell,1993
3. S. Chari, C. Jutla, J.R. Rao, P. Rohatgi. A cautionary note regarding evaluation of AES candidates on smart-cards, Proceedings of the second AES Candidate Conference, March 1999, pp. 133–147.
4. D. Chaum. Security without identification: transaction systems to make Big Brother obsolete, Communications of the ACM, vol.28, n.10, Oct 1985, pp.1030–1044.
5. J. Daemen, V. Rijmen. Resistance against implementation attacks A comparative study of the AES proposals, Proceedings of the second AES Candidate Conference, March 1999, pp. 122–132.