1. “State-of-the-art of secure ecc implementations: a survey on known side-channel attacks and countermeasures;Fan,2010
2. A refined power-analysis attack on elliptic curve cryptosystems;Goubin,2003
3. Ecdsa key extraction from mobile devices via nonintrusive physical side channels;Genkin,2016
4. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems;Kocher,1996
5. Online template attacks;Batina,2014