1. Lecture Notes in Computer Science;D Agrawal,2003
2. Anonymous: Anonymous (2015)
3. Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. Cryptology ePrint Archive, Report 2015/221 (2015).
http://eprint.iacr.org/
4. Lecture Notes in Computer Science;A Bogdanov,2016
5. Lecture Notes in Computer Science;E Brier,2004