1. Eli Biham and Adi Shamir, “Power Analysis of the Key Scheduling of the AES Candidates”, in Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, http://csrc.nist.gov/encryption/aes/round1/Conf2/aes2conf.htm , March 1999.
2. Carolynn Burwick, Don Coppersmith, Edward D’ Avignon, Rosario Gennaro, Shai Halevi, Charanjit Jutla, Stephen M. Matyas, Luke O’ Connor, Mohammad Peyra-vian, David Safford and Nevenko Zunic, “MARS-A Candidate Cipher for AES”, NIST AES Proposal, June 1998. Available at: http://www.research.ibm.com/security/mars.pdf
3. Suresh Chari, Charantjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards”, in Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, http://csrc.nist.gov/encryption/aes/round1/Conf2/aes2conf.htm , March 1999.
4. Suresh Chari, Charantjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks”, in Proceedings of Advances in Cryptology-CRYPTO’99, Springer-Verlag, 1999, pp. 398–412.
5. Jean-Srébastien Coron, “Resistance Against Differential Power Analysis for Ellipticc Curve Cryptosystems”, in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 292–302.