1. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems;Kocher,1996
2. Differential fault analysis of secret key cryptosystems;Biham,1997
3. Remote side-channel attacks on anonymous transactions;Tramèr,2020
4. Public-key cryptosystems resilient to key leakage;Naor,2009
5. Public-key encryption in the bounded-retrieval model;Alwen,2010