1. Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS 46, 203–213 (1999)
2. Lecture Notes in Computer Science;S. Chari,2003
3. Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Horizontal Correlation Analysis on Exponentiation. Cryptology ePrint Archive, Report 2010/394 (2010), http://eprint.iacr.org/2010/394
4. Lecture Notes in Computer Science;P.-A. Fouque,2006
5. Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryption Keys. In: 2008 USENIX Security Symposium (2008), http://www.usenix.org/events/sec08/tech/full_papers/halderman/halderman.pdf