1. Akkar M., Giraud C.: An implementation of DES and AES, Secure against some attacks. In: CHES 2001. Lecture Notes in Computer Science, vol. 2162, pp. 309–318. Springer, Heidelberg (2001).
2. ATMEL: ATmega 2561 data sheet (2011). http://www.atmel.com/dyn/resources/prod_documents/doc2549.pdf .
3. Blömer J., Guajardo J., Krummel V.: Provably secure masking of AES. In: Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 3357, pp. 69–83. Springer, Heidelberg (2005).
4. Brier E., Clavier C., Olivier F.: Correlation power analysis with a leakage model. In: CHES 2004. Lecture Notes in Computer Science, vol. 3156, pp. 135–152. Springer, Heidelberg (2004).
5. Brier E., Déchène I., Joye M.: Unified point addition formulæ for elliptic curve cryptosystems. In: Nedjah N., Mourelle L.M. (eds.) Embedded Cryptographic Hardware: Methodologies and Architectures, pp. 247–256. Nova Science, New York (2004).