1. Willam, S.: Cryptography and Network Security: Principles and Practices. Pearson Education, India (2006)
2. Galbraith, S.D.: Mathematics of Public Key Cryptography. Cambridge University Press (2012)
3. Grah, J.S.: Hash functions in cryptography. Master thesis, Institute of Informatics, Department of Mathematics, University of Bergen, June 2008
4. Zhou, Y., Feng, D.: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. In: Information Security Seminar (2005)
5. Khan, A.K., Mahanta, H.J.: Side channel attacks and their mitigation techniques. In: First International Conference on Automation, Control, Energy and Systems (ACES) (2014)