1. Biham E., Shamir A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S. A. (eds) CRYPTO, Lecture Notes in Computer Science, vol. 537, pp. 2–21. Springer, Berlin (1990)
2. Matsui, M., Yamagishi, A.: A new method for known plaintext attack of FEAL Cipher. In: EUROCRYPT, pp. 81–91 (1992)
3. Boneh, D., DeMillo, R. A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: EUROCRYPT, pp. 37–51 (1997)
4. Biham E., Shamir A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (eds) CRYPTO, Lecture Notes in Computer Science, vol. 1294, pp. 513–525. Springer, Berlin (1997)
5. Kocher P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (eds) CRYPTO, Lecture Notes in Computer Science, vol. 1109, pp. 104–113. Springer, Berlin (1996)