1. Lecture Notes in Computer Science;C Archambeau,2006
2. Belaid, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-2 in the hamming weight model. In: SECRYPT 2013–10th International Conference on Security and Cryptography, Reykjavik, Iceland. Scitepress (2013). https://hal.inria.fr/hal-00872410
3. Lecture Notes in Computer Science;Y Belenky,2021
4. Collin, S.: Side channel attacks against the Solo key - HMAC-SHA256 scheme. Ph.D. thesis, UCL - Ecole polytechnique de Louvain (2020). http://hdl.handle.net/2078.1/thesis:26545
5. Dang, Q.: FIPS 180-2, Secure Hash Standard. Federal Information Processing Standards (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD (2012)