1. Barthe, G., Belaïd, S., Dupressoir, F., Fouque, P.-A., Grégoire, B.: Compositional verification of higher-order masking: application to a verifying masking compiler. Cryptology ePrint Archive, Report 2015/506 (2015).
http://eprint.iacr.org/
2. Lecture Notes in Computer Science;G Barthe,2015
3. Lecture Notes in Computer Science;B Bilgin,2014
4. Blakely, G.R.: Safeguarding cryptographic keys. In: National Computer Conference, vol. 48, pp. 313–317. AFIPS Press, New York (1979)
5. Lecture Notes in Computer Science;C Carlet,2012