1. J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” in Proceedings of ESORICS’ 98, Springer-Verlag, September 1998, pp. 97–110.
2. Paul Kocher, Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in proceedings of Advances in Cryptology-CRYPTO’ 99, Springer-Verlag, 1999, pp. 388–397.
3. Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151–161.
4. Eli Biham and Adi Shamir, “Power Analysis of the Key Scheduling of the AES Candidates,” Second Advanced Encryption Standard Candidate Conference, March 1999, http://www.nist.gov/aes .
5. S. Chari, C. Jutla, J. R. Rao, and P. Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, http://www.nist.gov/aes , March 1999.