1. Lecture Notes in Computer Science;J Balasch,2012
2. Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the cost of lazy engineering for masked software implementations. Cryptology ePrint Archive, Report 2014/413 (2014).
http://eprint.iacr.org/
3. Batina, L., Gierlichs, B., Prouff, E., Rivain, M., Standaert, F.-X., Veyrat-Charvillon, N.: Mutual information analysis: a comprehensive study. J. Cryptology 24(2), 269–291 (2011)
4. Bayrak, A.G., Regazzoni, F., Bruna, D.N., Brisk, P., Standaert, F.-X., Lenne, P.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 99(PrePrints), 1 (2013)
5. Lecture Notes in Computer Science;B Bilgin,2014