1. Lecture Notes in Computer Science;C. Carlet,2012
2. Lecture Notes in Computer Science;S. Chari,1999
3. Coron, J.-S.: Higher order masking of look-up tables. Cryptology ePrint Archive, Report 2013/700. Full version of this paper (2013),
http://eprint.iacr.org/
4. Coron, J.-S.: Implementation of higher-order countermeasures (2013),
https://github.com/coron/htable/
5. Lecture Notes in Computer Science;J.-S. Coron,2007