1. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems;Kocher,1996
2. Efficient, Portable Template Attacks;Choudary;IEEE Trans.Inform.Forensic Secur,2018
3. Wavelet Support Vector Machine Algorithm in Power Analysis Attacks;Hou;RADIOENGINEERING,2017
4. Breaking Cryptographic Implementations Using Deep Learning Techniques;Maghrebi,2016
5. Deep learning for side-channel analysis and introduction to ASCAD database;Benadjila;J Cryptogr Eng,2020