1. Avanzi, R.-M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Verkauteren, F.: Handbook of elliptic and hyperelliptic curve cryptography (2006)
2. Akkar, M.-L.: Attaques et méthodes de protections de protections de systèmes de cryptographie embarquée. PhD thesis, Université de Versailles (2004)
3. Lecture Notes in Computer Science;E. Brier,2004
4. Lecture Notes in Computer Science;B. Boer den,2003
5. Clavier, C.: Side channel analysis for reverse engineering (SCARE), an improved attack against a secret A3/A8 GSM algorithm. IACR Cryptology eprint archive (049) (2004)