1. Information Security and Cryptography;J-P Aumasson,2014
2. Belaïd, S., Bettale, L., Dottax, E., Genelle, L., Rondepierre, F.: Differential power analysis of HMAC SHA-2 in the Hamming weight model. In: SECRYPT 2013, pp. 230–241. SciTePress (2013)
3. Lecture Notes in Computer Science;DJ Bernstein,2015
4. Lecture Notes in Computer Science;J Buchmann,2011
5. Lecture Notes in Computer Science;J Buchmann,2008