1. Archambeau, C., Peeters, E., Standaert, F.-X., & Quisquater, J.-J. (2006). Template attacks in principal subspaces. In Cryptographic Hardware and Embedded Systems—Proceedings of CHES 2006, Springer.
2. Agrawal, D., Rao, J. R., & Rohatgi, P. (2003). Multi-channel attacks. In C. D. Walter, Ç. K. Koç, & C. Paar (Eds.), CHES, Lecture Notes in Computer Science, (Vol. 2779, pp. 2–16). Springer.
3. Brier, E., Clavier, C., & Olivier, F. (2004) Correlation power analysis with a leakage model. In Joye and Quisquater [JQ04], (pp. 16–29).
4. Barreto, P., & Rijmen, V. The khazad legacy-level block cipher. In First open NESSIE Workshop, KU-Leuven, 2000. Submission to NESSIE.
5. Biham, E., & Shamir, A. (1990). Differential cryptanalysis of des-like cryptosystems. In A. Menezes & S. A. Vanstone (Eds.), CRYPTO, Lecture Notes in Computer Science, (Vol. 537, pp. 2–21). Springer.