1. Power analysis attacks to cryptographic circuits: a comparative analysis of DPA and CPA
2. Secure Double Rate Registers as an RTL Countermeasure Against Power Analysis Attacks
3. E. Brier , C. Clavier , and F. Olivier . 2004. Correlation Power Analysis with a Leakage Model . In Proc. Cryptogr. Hardw. Embed. Sys. E. Brier, C. Clavier, and F. Olivier. 2004. Correlation Power Analysis with a Leakage Model. In Proc. Cryptogr. Hardw. Embed. Sys.
4. Y. Fei et al. 2013. Side Channel Analysis Library. https://tescase.coe.neu.edu/?current_page=SOURCE_CODE&software=aestool Y. Fei et al. 2013. Side Channel Analysis Library. https://tescase.coe.neu.edu/?current_page=SOURCE_CODE&software=aestool
5. A statistics-based success rate model for DPA and CPA