1. Eli Biham and Adi Shamir. “Power Analysis of the Key Scheduling of the AES Candidates,” Second Advanced Encryption Standard Candidate Conference, Rome, March 1999.
2. Lect Notes Comput Sci;E. Biham,1997
3. Suresh Chari, Charanjit Jutla, Josyula R. Rao, and Pankaj Rohatgi. “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, Rome, March 1999.
4. Lect Notes Comput Sci;P. Kocher,1996
5. Paul Kocher, Joshua Jaffe, and Benjamin Jun. “Introduction to Differential Power Analysis and Related Attacks”.
http://www.cryptography.com/dpa/technical/index.html
. 1998.