1. Kocher P., Jaffe J., Jun B., “Differential power analysis”, Advances in Cryptology-Proceedings of CRYPTO’99 327
2. Chari S., Jutla CS., Rao JR., Rohatgi P.,“Towards sound approaches to counteract power analysis attacks”, Advances in Cryptology-Proceedings of CRYPTO’99 327, 328, 340
3. Messerges TS., “Using second-order power analysis to attack DPA resistant software”, Cryptographic Hardware and Embedded Systems-Proceedings of CHES 2000 327
4. Messerges TS., Dabbish EA., Sloan RH., “Investigations of power analysis attacks on smart cards”, Proceedings of the USENIX Workshop on Smart Card Technology 1999
5. Messerges TS., Dabbish EA., Sloan RH., “Examining Smart-Card Security under the Threat of Power Analysis Attacks”, IEEE Transactions on computers, Vol. 51, No. 5, May 2002 328, 337