1. Bernstein, D.J., Lange, T., van Vredendaal, C.: Tighter, faster, simpler side-channel security evaluations beyond computing power. IACR Cryptology ePrint Archive 2015/221 (2015).
http://eprint.iacr.org/2015/221
2. Bogdanov, A., Kizhvatov, I., Manzoor, K., Tischhauser, E., Witteman, M.: Fast and memory-efficient key recovery in side-channel attacks. IACR Cryptology ePrint Archive 2015/795 (2015)
3. Lecture Notes in Computer Science;C Glowacz,2015
4. Lecture Notes in Computer Science;P Kocher,1999
5. Longo, J., Martin, D.P., Mather, L., Oswald, E., Sach, B., Stam, M.: How low can you go? Using side-channel data to enhance brute-force key recovery. Cryptology ePrint Archive, Report 2016/609 (2016).
http://eprint.iacr.org/2016/609