1. Lecture Notes in Computer Science;M.-L. Akkar,2000
2. Lecture Notes in Computer Science;M.-L. Akkar,2001
3. Biham, E., Shamir, A.: Power Analysis of the Key Scheduling of the AES Candidates. In: Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference (March 1999), Available from http://csrc.nist.gov/encryption/aes/round1/Conf2/aes2conf.htm
4. Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards. In: Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference (March 1999), Available from http://csrc.nist.gov/encryption/aes/round1/Conf2/aes2conf.htm
5. Lecture Notes in Computer Science;S. Chari,1999