1. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In CRYPTO ’99. LNCS, vol. 1666, Springer, 1999, p. 388–397.
2. Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In CRYPTO ’96. LNCS, vol. 1109, Springer, 1996, p. 104–113.
3. Biham, E. and Shamir A.: Differential Fault Analysis of Secret Key Cryptosystems. In CRYTPO ’97. Springer, 1997.
4. Bond M. and Anderson R.: API-Level Attacks on Embedded Systems. Computer, vol. 29, 2001, p. 67–75.
5. Smith, S.W. and Weingart, S.H. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks (Special Issue on Computer Network Security) 31, 8 (Apr.), 831–860.