1. P. Kocher, J. Jaffe, and B. Jun, “Introduction to Differential Power Analysis and Related Attacks,”
http://www.cryptography.com/dpa/technical
, 1998.
2. T. S. Messerges, E. A. Dabbish and R. H. Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151–61.
3. P. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” in Proceedings of Advances in Cryptology-CRYPTO ’96, Springer-Verlag, 1996, pp. 104–13.
4. J. F. Dhem, F. Koeune, P. A. Leroux, P. Mestré, J. J. Quisquater and J.L. Willems,“APractical Implementation of the Timing Attack,” in Proceedings of CARDIS 1998, Sept. 1998.
5. D. Boneh and R. A. Demillo and R. J. Lipton, “On the Importance of Checking Cryptographic Protocols for Faults,” in Proceedings of Advances in Cryptology-Eurocrypt ’97, Springer-Verlag, 1997, pp. 37–51.