1. Lecture Notes in Computer Science;D Agrawal,2003
2. Lecture Notes in Computer Science;G Bertoni,2013
3. Lecture Notes in Computer Science;B Bilgin,2014
4. Bilgin, B., Nikova, S., Nikov, V., Rijmen, V., Tokareva, N.N., Vitkup, V.: Threshold implementations of small S-boxes. Crypt. Commun. 7(1), 3–33 (2015)
5. Faust, S., Grosso, V., Del Pozo, S.M., Paglialonga, C., Standaert, F.-X.: Composable masking schemes in the presence of physical defaults and the robust probing model. Cryptology ePrint Archive, Report 2017/711 (2017).
https://eprint.iacr.org/2017/711