1. Horizontal correlation analysis on exponentiation;Clavier,2010
2. Differential cluster analysis;Batina,2009
3. Entropy-based power attack;Maghrebi,2010
4. RSA key extraction via low-bandwidth acoustic cryptanalysis;Genkin,2014
5. M. Backes, M. Dürmuth, S. Gerling, M. Pinkal, C. Sporleder, Acoustic side-channel attacks on printers, in: USENIX Security Symposium, 2010, pp. 307–322.