1. Bévan R., Knudsen E.: Ways to enhance differential power analysis. In: Lee, P., Lim, C. (eds.) Information Security and Cryptolog—ICISC 2002. Lecture Notes in Computer Science, vol, 2587, pp. 327–342. Springer, New York (2002).
2. Bilgin B., Nikova S., Nikov V., Rijmen V., Stütz G.: Threshold implementations of all $$3 \times 3$$ 3 × 3 and $$4 \times 4$$ 4 × 4 s-boxes. In: Prouff E., Schaumont P. (eds.): Cryptographic Hardware and Embedded Systems—CHES 2012—14th International Workshop, Leuven, Belgium, 9–12 Sept, 2012. Lecture Notes in Computer Science, vol. 7428, pp. 76–91. Springer, New York (2012).
3. Borghoff J., Canteaut A., Güneysu T., Kavun E.B., Knezevic M., Knudsen L.R., Leander G., Nikov V., Paar C., Rechberge C., Rombouts P., Thomsen S.S., Yalçin T.: PRINCE—a low-latency block cipher for pervasive computing applications—extended abstract. In: Wang X., Sako K. (eds.) Advances in Cryptology—ASIACRYPT 2012—18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, 2–6 Dec, 2012. Lecture Notes in Computer Science, vol. 7658, pp. 208–225. Springer, New York (2012).
4. Brier E., Clavier C., Olivier F.: Correlation power analysis with a leakage model. In: Joye M., Quisquater J.J. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2004. Lecture Notes in Computer Science, vol. 3156, pp. 16–29. Springer, New York (2004).
5. Carlet C.: On Highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Maitra S., Veni Madhavan C.E., Venkatesan R. (eds.) Progress in Cryptology—INDOCRYPT 2005. Lecture Notes in Computer Science, vol. 3797, pp. 49–62. Springer, New York (2006).