1. Hess, E., Janssen, N., Meyer, B., Schuetze, T.: Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures – a Survey. In: Proc. Of EUROSMART Security Conference, pp. 55–64 (2000)
2. Lecture Notes in Computer Science;P. Kocher,1999
3. Tiri, K., Akmal, M., Verbauwhede, I.: A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In: Proc. Of 28th European Solid-State Circuits Conference, pp. 403–406 (2002)
4. Bernstein, K., Carig, M., Durham, C., Hansen, P., Hogenmiller, D., Nowak, E., Rohrer, N.: High Speed CMOS Design Styles, pp. 111–123. Kluwer Academic Publishers (1998)
5. National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46 (January 1977)