1. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems;Kocher,1996
2. The doubling attack why upwards is better than downwards;Fouque,2003
3. Power analysis by exploiting chosen message and internal collisions-vulnerability of checking mechanism for RSA-decryption;Yen,2005
4. Comparative power analysis of modular exponentiation algorithms;Shamir;IEEE Trans Comput,2010
5. Differential power analysis;Kocher,1999