1. Carlet, C., Gaborit, P., Kim, J.-L., Solé, P.: A new class of codes for Boolean masking of cryptographic computations, October 6 (2011),
http://dblp.uni-trier.de/rec/bibtex/journals/tit/CarletGKS12
2. Dichtl, M.: A new method of black box power analysis and a fast algorithm for optimal key search. J. Cryptographic Engineering 1(4), 255–264 (2011)
3. DPA Contest (2nd edition) (2009-2010),
http://www.DPAcontest.org/v2/
4. Grassl, M.: Bounds on the minimum distance of linear codes and quantum codes (2007),
http://www.codetables.de/
(accessed on July 23, 2012)
5. Heuser, A., Schindler, W., Stöttinger, M.: Revealing side-channel issues of complex circuits by enhanced leakage models. In: Rosenstiel, W., Thiele, L. (eds.) DATE, pp. 1179–1184. IEEE (2012)