1. Federal Information Processing Standards Publication (FIPS 197). Advanced Encryption Standard (AES) (2001)
2. Oswald, M.E., Mangard, S., Herbst, C., Tillich, S.: Practical second-order dpa attacks for masked smart card implementations of block ciphers. In: Pointcheval, D. (ed.) Topics in Cryptology - CT-RSA 2006. Lecture Notes in Computer Science, vol. 3860, pp. 192–207. Springer, Berlin (2006)
3. Raval, N., Bansod, G., Pisharoty, N.: Implementation of efficient bit permutation box for embedded security. WSEAS Trans. Comput. 13(1), 442–451 (2014)
4. Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Second International Conference on Applied Cryptography and Network Security (ACNS 2006). Lecture Notes in Computer Science, vol. 3989, 239–252. Springer, Heidelberg (2006)
5. 5. Joye, M., Olivier, F.: Side-channel analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn., pp. 1198–1204. Springer (2011). ISBN: 978-1-4419-5905-8