1. Arkko, J., Haverinen, H.: RFC 4187: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) (2006)
2. Belaïd, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-2 in the Hamming weight model. In: Samarati, P. (ed.) SECRYPT, SECRYPT is Part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 230–241. SciTePress, USA (2013)
3. Lecture Notes in Computer Science;M Bellare,1996
4. Bertoni, G., Daemen, J., Debande, N., Le, T.H., Peeters, M., Van Assche, G.: Power Analysis of Hardware Implementations Protected with Secret Sharing. IACR Cryptology ePrint Archive Report 2013/67 (2013).
http://eprint.iacr.org/2013/67
. A preliminary version appeared at MICROW’12 [5]
5. Bertoni, G., Daemen, J., Debande, N., Le, T. H., Peeters, M., Van Assche, G.: Power analysis of hardware implementations protected with secret sharing. In: 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops (MICROW), pp. 9–16. IEEE Computer Society (2012)