1. Sornin, N., Luis, M., Eirich, T., Kramp, T., Hersent, O.: LoRaWAN Specification V1.0. Tech. rep., LoRa Alliance (2015)
2. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology: Proceedings of CRYPTO’99, no. 1666 in Lecture Notes in Computer Science, pp. 388–397. Springer, Berlin (1999)
3. Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), no. 2162 in Lecture Notes in Computer Science, pp. 255–265. Springer, Berlin (2001)
4. Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer, Berlin (1996)
5. Ledwaba, L.P.I., Hancke, G.P., Venter, H.S., Isaac, S.J.: Performance costs of software cryptography in securing new-generation internet of energy endpoint devices. IEEE Access 6, 9303 (2018). https://doi.org/10.1109/ACCESS.2018.2793301