1. http://perso.uclouvain.be/fstandae/PUBLIS/154.zip
2. Lecture Notes in Computer Science;C Archambeau,2006
3. Lecture Notes in Computer Science;T Baignères,2004
4. Balasch, J., Faust, S., Gierlichs, B., Verbauwhede, I.: Theory and practice of a leakage resilient masking scheme. In: Wang and Sako [67], pp. 758–775
5. Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.-X.: On the Cost of Lazy Engineering for Masked Software Implementations. IACR Cryptology ePrint Archive 2014:413 (2014)