1. LNCS;M. Abdalla,2013
2. Lecture Notes in Computer Science;M. Abdalla,2000
3. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: FOCS, pp. 394–403 (1997)
4. Bernstein, D.J.: Implementing ”Practical leakage-resilient symmetric cryptography”. In: CHES 2012 Rump Session (2012),
http://cr.yp.to/talks/2012.09.10/slides.pdf
5. Biryukov, A., Khovratovich, D.: Two New Techniques of Side-Channel Cryptanalysis. In: Paillier, Verbauwhede (eds.) [25], pp. 195–208