1. Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems;Kocher,1996
2. Differential power analysis;Kocher,1999
3. Electromagnetic analysis: concrete results;Gandolfi,2001
4. Power Analysis Attacks;Mangard,2007
5. Statistics and secret leakage;Coron,2001