1. Lecture Notes in Computer Science;M-L Akkar,2001
2. Lecture Notes in Computer Science;E Brier,2004
3. Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. IACR Cryptology ePrint Archive, 2011:302 (2011)
4. Feix, B., Thiebeauld, H.: Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques. Cryptology ePrint Archive, Report 2014/702 (2014)
5. Federal Information Processing Standards Publication (FIPS). Data Encryption Standard - DES, FIPS PUB 46-3 (1999)