1. ANSSI, Amossys, EDSI, LETI, Lexfo, Oppida, Quarkslab, SERMA, Synacktiv, Thales, Trusted Labs: Inter-CESTI: Methodological and Technical Feedbacks on Hardware Devices Evaluations. Technical report (2020). https://www.sstic.org/2020/presentation/inter-cesti_methodological_and_technical_feedbacks_on_hardware_devices_evaluations/
2. Archambeau, C., Peeters, E., Standaert, F.X., Quisquater, J.J.: Template attacks in principal subspaces. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 1–14. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_1
3. Belaíd, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-1 and HMAC SHA-2 in the hamming weight model. In: Obaidat, M., Holzinger, A., Filipe, J. (eds.) ICETE 2014. CCIS, vol. 554, pp. 363–379. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25915-4_19
4. BSI: Anwendungshinweise und Interpretationen zum Schema (AIS) 46. Technical report, BSI (2013). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_46_pdf.pdf?__blob=publicationFile&v=1
5. Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36400-5_3