1. Lecture Notes in Computer Science;J Balasch,2015
2. Lecture Notes in Computer Science;G Barthe,2015
3. Barthe, G., Dupressoir, F., Faust, S., Grégoire, B., Standaert, F.-X., Strub, P.-Y.: Parallel implementations of masking schemes and the bounded moment leakage model. Cryptology ePrint Archive, Report 2016/912 (2016).
http://eprint.iacr.org/2016/912
4. Lecture Notes in Computer Science;E Biham,1997
5. Lecture Notes in Computer Science;B Bilgin,2014