1. Almeida, J.B., Barbosa, M., Barthe, G., Dupressoir, F., Emmi, M.: Verifying constant-time implementations. In: 25th USENIX Security Symposium, USENIX Security 2016, Austin, TX, USA, 10–12 August 2016, pp. 53–70 (2016)
2. Lecture Notes in Computer Science;G Barthe,2015
3. Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: International Symposium on Electromagnetic Compatibility (EMC 2014/Tokyo). IEEE (May 12–16 2014), Session OS09: EM Information Leakage. Hitotsubashi Hall (National Center of Sciences), Chiyoda, Tokyo, Japan (2014)
4. Bhattacharya, S., Maurice, C., Bhasin, S., Mukhopadhyay, D.: Branch prediction attack on blinded scalar multiplication. IEEE Trans. Comput. 69(5), 633–648 (2020)
5. Blömer, J., Guajardo, J., Krummel, V.: Provably secure masking of AES. In: Selected Areas in Cryptography, pp. 69–83 (2004)